INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:8323ec00 r4:8323ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b600 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb703000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576338c r4:85763000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576338c r4:830b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323ec00 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ed34 r7:df83de60 r6:830b8600 r5:8323ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b6180 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/1:1:43 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df911d84 r8:00000002 r7:60000113 r6:df911d8c r5:83308000 r4:83308000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83308000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 INFO: task kworker/1:1:43 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/0:2:2863 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:2863 tgid:2863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ebaa9d84 r8:00000002 r7:60000013 r6:ebaa9d8c r5:83b1e000 r4:83b1e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b1e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b7c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763b8c r4:85763800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85763b8c r4:8434ce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b1e000 r8:8434ceac r7:82804d40 r6:dddced40 r5:dddced60 r4:8434ce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8434ce80 r8:8027ed34 r7:df83de60 r6:845c2b80 r5:83b1e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa9fb0 to 0xebaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8427e540 INFO: task kworker/0:2:2863 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/0:0:3079 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3079 tgid:3079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df979d84 r8:00000002 r7:60000013 r6:df979d8c r5:841ac800 r4:841ac800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841ac800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179cc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9bf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513e38c r4:8513e000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513e38c r4:848d4480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841ac800 r8:848d44ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4480 r8:8027ed34 r7:ebaa9e60 r6:8424fc80 r5:841ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84288840 INFO: task kworker/0:0:3079 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/1:4:3100 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3100 tgid:3100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9b1d84 r8:00000002 r7:60000013 r6:df9b1d8c r5:838b5400 r4:838b5400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b5400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:838b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb73000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b27f8c r4:84b27c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b27f8c r4:8424f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b5400 r8:8424f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424f180 r8:8027ed34 r7:df911e60 r6:8424f200 r5:838b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b1fb0 to 0xdf9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846e2ac0 INFO: task kworker/1:4:3100 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/1:5:3104 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3104 tgid:3104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df96dd84 r8:00000002 r7:60000113 r6:df96dd8c r5:8324a400 r4:8324a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7980 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9e78c r4:84b9e400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9e78c r4:8424f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:8424f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424f500 r8:8027ed34 r7:df9b1e60 r6:8424f300 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf96dfb0 to 0xdf96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84607500 INFO: task kworker/1:5:3104 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/1:6:3105 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3105 tgid:3105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9c9d84 r8:00000002 r7:60000113 r6:df9c9d8c r5:841a8c00 r4:841a8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841a8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf80c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:841a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9f78c r4:84b9f400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9f78c r4:8424f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841a8c00 r8:8424f4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424f480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424f480 r8:8027ed34 r7:df96de60 r6:8424f580 r5:841a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c9fb0 to 0xdf9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84607500 INFO: task kworker/1:6:3105 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/1:7:3107 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3107 tgid:3107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:832d8000 r4:832d8000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832d8000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526afc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:832d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfceb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529078c r4:85290400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529078c r4:8424f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832d8000 r8:8424f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424f600 r8:8027ed34 r7:df9c9e60 r6:8424f780 r5:832d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84617740 INFO: task kworker/1:7:3107 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/1:8:3108 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3108 tgid:3108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9a9d84 r8:00000002 r7:60000113 r6:df9a9d8c r5:84150c00 r4:84150c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84150c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851729c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84150c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85134f8c r4:85134c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85134f8c r4:8424f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84150c00 r8:8424f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424f800 r8:8027ed34 r7:df9d5e60 r6:8424f880 r5:84150c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8461dd80 INFO: task kworker/1:8:3108 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/0:3:3111 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3111 tgid:3111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:83b1d400 r4:83b1d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b1d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b3c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85762b8c r4:85762800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85762b8c r4:848d4500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b1d400 r8:848d452c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4500 r8:8027ed34 r7:ebaa9e60 r6:8424f900 r5:83b1d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84947d00 INFO: task kworker/0:3:3111 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3113 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3113 tgid:3113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:84156c00 r4:84156c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84156c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2d00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84156c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513ff8c r4:8513fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513ff8c r4:8424f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84156c00 r8:8424f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424f980 r8:8027ed34 r7:df9d5e60 r6:8424fe00 r5:84156c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d0540 INFO: task kworker/1:9:3113 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3115 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83b19800 r4:83b19800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b19800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ef040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b19800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab15000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f3f8c r4:842f3c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f3f8c r4:8424fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b19800 r8:8424fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424fd80 r8:8027ed34 r7:df9d5e60 r6:8424fd00 r5:83b19800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d00c0 INFO: task kworker/1:10:3115 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3117 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84503000 r4:84503000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84503000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ddd00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84503000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85291f8c r4:85291c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85291f8c r4:8424fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84503000 r8:8424fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424fc00 r8:8027ed34 r7:dfa19e60 r6:8424fb00 r5:84503000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0340 INFO: task kworker/1:11:3117 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0 5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3119 blocked for more than 450 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:84501800 r4:84501800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84501800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a36880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84501800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0729000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c8b8c r4:852c8800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c8b8c r4:8424fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84501800 r8:8424fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424fa00 r8:8027ed34 r7:dfa19e60 r6:8424ff80 r5:84501800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0340 INFO: task kworker/1:12:3119 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7f540000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 900d0113 ffffffff r5:900d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3121 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:84500c00 r4:84500c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84500c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa4400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84500c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f0b8c r4:842f0800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f0b8c r4:8424ff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84500c00 r8:8424ff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8424ff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8424ff00 r8:8027ed34 r7:df9e1e60 r6:8424fe80 r5:84500c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d06c0 INFO: task kworker/1:13:3121 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7f819000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 900d0113 ffffffff r5:900d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3123 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:84506000 r4:84506000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84506000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a9c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84506000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff8f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cbf8c r4:852cbc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852cbf8c r4:83bd2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84506000 r8:83bd21ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bd2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bd2180 r8:8027ed34 r7:df9e1e60 r6:83bd2100 r5:84506000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0840 INFO: task kworker/1:14:3123 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7fac9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 900d0113 ffffffff r5:900d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3125 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:84506c00 r4:84506c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84506c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5fa40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84506c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c9f8c r4:852c9c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c9f8c r4:8329e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84506c00 r8:8329e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8329e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8329e000 r8:8027ed34 r7:dfa39e60 r6:830cd100 r5:84506c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0880 INFO: task kworker/1:15:3125 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7fe4f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 900d0113 ffffffff r5:900d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3127 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:84500000 r4:84500000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84500000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ea00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84500000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc91000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551b78c r4:8551b400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551b78c r4:830cd380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84500000 r8:830cd3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd380 r8:8027ed34 r7:dfa39e60 r6:830cd080 r5:84500000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0a00 INFO: task kworker/1:16:3127 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8006d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3129 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:84504800 r4:84504800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84504800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba3c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84504800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0085000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dc78c r4:854dc400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854dc78c r4:833ccd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84504800 r8:833ccdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833ccd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833ccd80 r8:8027ed34 r7:dfa5de60 r6:833cce00 r5:84504800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0d00 INFO: task kworker/1:17:3129 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 801e1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3132 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:84502400 r4:84502400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84502400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516da00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84502400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497578c r4:84975400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8497578c r4:833b4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84502400 r8:833b4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4f00 r8:8027ed34 r7:dfa5de60 r6:8423a780 r5:84502400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0f80 INFO: task kworker/1:18:3132 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 80517000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3133 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:84503c00 r4:84503c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84503c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dfbc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84503c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564af8c r4:8564ac00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564af8c r4:8423a700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84503c00 r8:8423a72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8423a700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423a700 r8:8027ed34 r7:dfa69e60 r6:84958000 r5:84503c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d0f80 INFO: task kworker/1:19:3133 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 807d5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3134 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83acec00 r4:83acec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855de780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83acec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb465000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554878c r4:85548400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554878c r4:84958080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acec00 r8:849580ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958080 r8:8027ed34 r7:dfa75e60 r6:84958100 r5:83acec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955040 INFO: task kworker/1:20:3134 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 809c9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3137 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83aca400 r4:83aca400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aca400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85388740 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85592f8c r4:85592c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85592f8c r4:84958180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aca400 r8:849581ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958180 r8:8027ed34 r7:dfa75e60 r6:84958200 r5:83aca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955180 INFO: task kworker/1:21:3137 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 80d18000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3139 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83ac8c00 r4:83ac8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ac8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852764c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559138c r4:85591000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8559138c r4:84958280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac8c00 r8:849582ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958280 r8:8027ed34 r7:dfa8de60 r6:84958300 r5:83ac8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849552c0 INFO: task kworker/1:22:3139 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 80f1d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3141 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83acbc00 r4:83acbc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acbc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b59fc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84976f8c r4:84976c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84976f8c r4:84958380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acbc00 r8:849583ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958380 r8:8027ed34 r7:dfa8de60 r6:84958400 r5:83acbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955340 INFO: task kworker/1:23:3141 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 812ea000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3142 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83acd400 r4:83acd400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acd400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85708980 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85593b8c r4:85593800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85593b8c r4:84958480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acd400 r8:849584ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958480 r8:8027ed34 r7:dfaa5e60 r6:84958500 r5:83acd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955340 INFO: task kworker/1:24:3142 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 81663000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3145 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83acc800 r4:83acc800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acc800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d7cc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab31000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84977b8c r4:84977800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84977b8c r4:84958580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acc800 r8:849585ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958580 r8:8027ed34 r7:dfaa5e60 r6:84958600 r5:83acc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955840 INFO: task kworker/1:25:3145 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 818ac000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3146 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:83acb000 r4:83acb000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acb000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83acb000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576278c r4:85762400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576278c r4:84958680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acb000 r8:849586ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958680 r8:8027ed34 r7:dfabde60 r6:84958700 r5:83acb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955780 INFO: task kworker/1:26:3146 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 81df6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3149 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83ac9800 r4:83ac9800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ac9800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b64c40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e4f8c r4:857e4c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857e4f8c r4:84958780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac9800 r8:849587ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958780 r8:8027ed34 r7:dfabde60 r6:84958800 r5:83ac9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955bc0 INFO: task kworker/1:27:3149 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 820aa000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3151 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83fb6000 r4:83fb6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fb6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba41000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84977f8c r4:84977c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84977f8c r4:84958900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb6000 r8:8495892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958900 r8:8027ed34 r7:dfabde60 r6:84958980 r5:83fb6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955c00 INFO: task kworker/1:28:3151 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 821ba000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3153 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83fb6c00 r4:83fb6c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb6c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3f80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0653000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84974f8c r4:84974c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84974f8c r4:84958880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb6c00 r8:849588ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958880 r8:8027ed34 r7:dfae5e60 r6:84958a00 r5:83fb6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84955c00 INFO: task kworker/1:29:3153 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 826eb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3155 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83fb0c00 r4:83fb0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2d40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fb0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e138c r4:856e1000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e138c r4:84958a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb0c00 r8:84958aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958a80 r8:8027ed34 r7:dfaf1e60 r6:84958b00 r5:83fb0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496b200 INFO: task kworker/1:30:3155 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 82835000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3157 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:83fb4800 r4:83fb4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cd800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f19b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590db8c r4:8590d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8590db8c r4:84958c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb4800 r8:84958c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958c00 r8:8027ed34 r7:dfafde60 r6:84958c80 r5:83fb4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496b100 INFO: task kworker/1:31:3157 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 82a57000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3158 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83fb3c00 r4:83fb3c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb3c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fb3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f187000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590d78c r4:8590d400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8590d78c r4:84958d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb3c00 r8:84958d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958d00 r8:8027ed34 r7:dfad9e60 r6:84958d80 r5:83fb3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496b100 INFO: task kworker/1:32:3158 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 83320000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3160 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83fb1800 r4:83fb1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b480 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83fb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85762f8c r4:85762c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85762f8c r4:848d4300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb1800 r8:848d432c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4300 r8:8027ed34 r7:ebaa9e60 r6:84958e00 r5:83fb1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494ad40 INFO: task kworker/0:4:3160 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 834bc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3166 blocked for more than 451 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83fb0000 r4:83fb0000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb0000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bc00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83fb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb891000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dcb8c r4:857dc800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857dcb8c r4:848d4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb0000 r8:848d45ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4580 r8:8027ed34 r7:ebaa9e60 r6:84958e80 r5:83fb0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494afc0 INFO: task kworker/0:5:3166 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8364d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3167 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83896c00 r4:83896c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83896c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b8c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83896c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763f8c r4:85763c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85763f8c r4:848d4600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83896c00 r8:848d462c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4600 r8:8027ed34 r7:dfb4de60 r6:84958f00 r5:83896c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494acc0 INFO: task kworker/0:6:3167 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 837f5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3168 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:841a6000 r4:841a6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841a6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849329c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:841a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f297000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec439000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0378c r4:85a03400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a0378c r4:84958f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841a6000 r8:84958fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84958f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84958f80 r8:8027ed34 r7:dfad9e60 r6:84967000 r5:841a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496bc00 INFO: task kworker/1:33:3168 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 838d3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3169 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:841a0000 r4:841a0000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841a0000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b9c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb805000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dc38c r4:857dc000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857dc38c r4:848d4680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841a0000 r8:848d46ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4680 r8:8027ed34 r7:dfb4de60 r6:84967080 r5:841a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494a900 INFO: task kworker/0:7:3169 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 83c80000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3171 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:841a3000 r4:841a3000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841a3000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362a80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:841a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8470478c r4:84704400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8470478c r4:84967100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841a3000 r8:8496712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967100 r8:8027ed34 r7:dfb5de60 r6:84967180 r5:841a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496bdc0 INFO: task kworker/1:34:3171 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 83ef6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3174 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:841a2400 r4:841a2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841a2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ffc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3d5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857de38c r4:857de000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857de38c r4:848d4700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841a2400 r8:848d472c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4700 r8:8027ed34 r7:dfb4de60 r6:84967200 r5:841a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494a640 INFO: task kworker/0:8:3174 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 841c2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3175 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:83308c00 r4:83308c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83308c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bdc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dd38c r4:857dd000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857dd38c r4:848d4780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308c00 r8:848d47ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4780 r8:8027ed34 r7:dfb79e60 r6:84967280 r5:83308c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84277000 INFO: task kworker/0:9:3175 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 845a9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3178 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:83fbe000 r4:83fbe000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fbe000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83fbe000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec389000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dd78c r4:857dd400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857dd78c r4:848d4800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fbe000 r8:848d482c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4800 r8:8027ed34 r7:dfb79e60 r6:84967300 r5:83fbe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84277000 INFO: task kworker/0:10:3178 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 845a9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3179 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:83fb8c00 r4:83fb8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539a640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fb8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f35d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf5b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a99b8c r4:85a99800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a99b8c r4:84967380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb8c00 r8:849673ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967380 r8:8027ed34 r7:dfb5de60 r6:84967400 r5:83fb8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496ba80 INFO: task kworker/1:35:3179 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 849a2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3181 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb99d84 r8:00000002 r7:60000013 r6:dfb99d8c r5:83fba400 r4:83fba400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fba400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fba400 r7:00000000 r6:83018200 r5:00001000 r4:7f2a7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3a7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9df8c r4:85a9dc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a9df8c r4:84967480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fba400 r8:849674ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967480 r8:8027ed34 r7:dfb21e60 r6:84967500 r5:83fba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d3f80 INFO: task kworker/1:36:3181 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8509b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3187 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83fb9800 r4:83fb9800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb9800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83fb9800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3a1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ddb8c r4:857dd800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ddb8c r4:848d4880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb9800 r8:848d48ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4880 r8:8027ed34 r7:dfb79e60 r6:84967680 r5:83fb9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:842775c0 INFO: task kworker/0:11:3187 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 85521000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3189 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:83fbec00 r4:83fbec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fbec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83fbec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa65000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857def8c r4:857dec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857def8c r4:848d4900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fbec00 r8:848d492c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4900 r8:8027ed34 r7:dfb79e60 r6:84967700 r5:83fbec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84277840 INFO: task kworker/0:12:3189 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 85664000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3190 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbe1d84 r8:00000002 r7:60000013 r6:dfbe1d8c r5:83fbbc00 r4:83fbbc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fbbc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83fbbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec43f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857deb8c r4:857de800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857deb8c r4:848d4980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fbbc00 r8:848d49ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4980 r8:8027ed34 r7:dfbdde60 r6:84967780 r5:83fbbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84277780 INFO: task kworker/0:13:3190 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 858ef000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3192 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:84194800 r4:84194800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84194800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85609cc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84194800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b75b8c r4:85b75800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b75b8c r4:84967800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84194800 r8:8496782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967800 r8:8027ed34 r7:dfba5e60 r6:84967880 r5:84194800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849726c0 INFO: task kworker/1:38:3192 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 85b8c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3194 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83fb8000 r4:83fb8000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fb8000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1500 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83fb8000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff27000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857df38c r4:857df000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857df38c r4:848d4a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb8000 r8:848d4a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d4a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d4a00 r8:8027ed34 r7:dfbdde60 r6:84967900 r5:83fb8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84277880 INFO: task kworker/0:14:3194 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 85f32000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3195 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:83fbd400 r4:83fbd400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83fbd400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853834c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83fbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f461000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4df000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba3b8c r4:85ba3800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ba3b8c r4:84967980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fbd400 r8:849679ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967980 r8:8027ed34 r7:dfba5e60 r6:84967a00 r5:83fbd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849726c0 INFO: task kworker/1:39:3195 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 860c4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3197 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:83b01800 r4:83b01800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b01800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972a40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f429000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec817000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c58b8c r4:85c58800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c58b8c r4:84967a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b01800 r8:84967aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967a80 r8:8027ed34 r7:dfba5e60 r6:84967b00 r5:83b01800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84972b40 INFO: task kworker/1:40:3197 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 86717000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3199 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83af8000 r4:83af8000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af8000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83af8000 r7:00000000 r6:83018200 r5:00001000 r4:7f4ed000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed65f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c58f8c r4:85c58c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c58f8c r4:84967b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af8000 r8:84967bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967b80 r8:8027ed34 r7:dfba5e60 r6:84967c00 r5:83af8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84972a80 INFO: task kworker/1:41:3199 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 86a2d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3201 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000013 r6:dfbbdd8c r5:83af8c00 r4:83af8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b53680 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83af8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4db000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c5938c r4:85c59000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c5938c r4:84967c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af8c00 r8:84967cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84967c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84967c80 r8:8027ed34 r7:dfba5e60 r6:84967d00 r5:83af8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84972a80 INFO: task kworker/1:42:3201 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 86ce3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:3423 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:3423 tgid:3423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfd71d84 r8:00000002 r7:60000113 r6:dfd71d8c r5:84ad8c00 r4:84ad8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ad8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcd0c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84ad8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a7ff8c r4:84a7fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84a7ff8c r4:84921480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad8c00 r8:849214ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84921480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921480 r8:8027ed34 r7:dfd65e60 r6:84921500 r5:84ad8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491b400 INFO: task kworker/1:73:3423 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87159000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:3491 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff81d84 r8:00000002 r7:60000113 r6:dff81d8c r5:84ae3c00 r4:84ae3c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae3c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff81e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84ae3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa25000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1ff8c r4:84b1fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1ff8c r4:84921d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae3c00 r8:84921dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84921d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921d80 r8:8027ed34 r7:dfd71e60 r6:84921e00 r5:84ae3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff81fb0 to 0xdff81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b43dc0 INFO: task kworker/1:76:3491 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87590000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:131:3509 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:131 state:D stack:0 pid:3509 tgid:3509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe1d84 r8:00000002 r7:60000113 r6:dffe1d8c r5:84aebc00 r4:84aebc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aebc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b489c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84aebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2078c r4:84b20400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2078c r4:84b4a600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aebc00 r8:84b4a62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a600 r8:8027ed34 r7:dffd5e60 r6:84b58080 r5:84aebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b484c0 INFO: task kworker/0:131:3509 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87590000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:3510 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:3510 tgid:3510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe5d84 r8:00000002 r7:60000013 r6:dffe5d8c r5:84ae8c00 r4:84ae8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b488c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ae8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa79000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2038c r4:84b20000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2038c r4:84b4a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae8c00 r8:84b4a6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a680 r8:8027ed34 r7:dffe1e60 r6:84b58100 r5:84ae8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe5fb0 to 0xdffe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b484c0 INFO: task kworker/0:132:3510 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87b26000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:3512 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:3512 tgid:3512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:84aec800 r4:84aec800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aec800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55600 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84aec800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a7f38c r4:84a7f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84a7f38c r4:84b58180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aec800 r8:84b581ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b58180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b58180 r8:8027ed34 r7:dfd71e60 r6:84b58200 r5:84aec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffddfb0 to 0xdffddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b55540 INFO: task kworker/1:77:3512 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87ee0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3514 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3514 tgid:3514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:84aed400 r4:84aed400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aed400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55a80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84aed400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a7f78c r4:84a7f400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84a7f78c r4:84b58280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aed400 r8:84b582ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b58280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b58280 r8:8027ed34 r7:dfd71e60 r6:84b58300 r5:84aed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff2dfb0 to 0xdff2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b55480 INFO: task kworker/1:78:3514 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87fd5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:133:3517 blocked for more than 452 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:133 state:D stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffedd84 r8:00000002 r7:60000013 r6:dffedd8c r5:84aeec00 r4:84aeec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aeec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48ac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84aeec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b20b8c r4:84b20800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b20b8c r4:84b4a700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aeec00 r8:84b4a72c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a700 r8:8027ed34 r7:dffe1e60 r6:84b58380 r5:84aeec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffedfb0 to 0xdffedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b487c0 INFO: task kworker/0:133:3517 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8828a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:3518 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:3518 tgid:3518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff1d84 r8:00000002 r7:60000013 r6:dfff1d8c r5:84aea400 r4:84aea400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aea400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48cc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84aea400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb37000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b20f8c r4:84b20c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b20f8c r4:84b4a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aea400 r8:84b4a7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a780 r8:8027ed34 r7:dffede60 r6:84b58400 r5:84aea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff1fb0 to 0xdfff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48840 INFO: task kworker/0:134:3518 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 888ab000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:3522 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:3522 tgid:3522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84ae6c00 r4:84ae6c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae6c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48f80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd61000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2178c r4:84b21400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2178c r4:84b4a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae6c00 r8:84b4a82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a800 r8:8027ed34 r7:dfff1e60 r6:84b58480 r5:84ae6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48b40 INFO: task kworker/0:135:3522 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88a0d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3524 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3524 tgid:3524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff9d84 r8:00000002 r7:60000113 r6:dfff9d8c r5:84ae6000 r4:84ae6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ee40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a7fb8c r4:84a7f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84a7fb8c r4:84b58500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae6000 r8:84b5852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b58500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b58500 r8:8027ed34 r7:dfd71e60 r6:84b58580 r5:84ae6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff9fb0 to 0xdfff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b55ac0 INFO: task kworker/1:79:3524 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88f67000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:3525 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:3525 tgid:3525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfffdd84 r8:00000002 r7:60000013 r6:dfffdd8c r5:84af0000 r4:84af0000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af0000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfffde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd25000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2138c r4:84b21000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2138c r4:84b4a880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af0000 r8:84b4a8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a880 r8:8027ed34 r7:dfff5e60 r6:84b58600 r5:84af0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfffdfb0 to 0xdfffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48bc0 INFO: task kworker/0:136:3525 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88f67000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:3527 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:3527 tgid:3527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0005d84 r8:00000002 r7:60000113 r6:e0005d8c r5:84af1800 r4:84af1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0005e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b485c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af1800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd95000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b21b8c r4:84b21800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b21b8c r4:84b4a900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af1800 r8:84b4a92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a900 r8:8027ed34 r7:dfff5e60 r6:84b58680 r5:84af1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0005fb0 to 0xe0005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48e00 INFO: task kworker/0:137:3527 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 89b84000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:3528 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:3528 tgid:3528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0009d84 r8:00000002 r7:60000013 r6:e0009d8c r5:84af2400 r4:84af2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff53000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2378c r4:84b23400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2378c r4:84b4a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af2400 r8:84b4a9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a980 r8:8027ed34 r7:e0005e60 r6:84b58700 r5:84af2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0009fb0 to 0xe0009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48ec0 INFO: task kworker/0:138:3528 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 89b84000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:3530 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:3530 tgid:3530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0011d84 r8:00000002 r7:60000113 r6:e0011d8c r5:84af3c00 r4:84af3c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af3c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2d00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b21f8c r4:84b21c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b21f8c r4:84b4aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af3c00 r8:84b4aa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4aa00 r8:8027ed34 r7:e0009e60 r6:84b58780 r5:84af3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0011fb0 to 0xe0011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48f00 INFO: task kworker/0:139:3530 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 89e5c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:3532 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:3532 tgid:3532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0019d84 r8:00000002 r7:60000013 r6:e0019d8c r5:84af4800 r4:84af4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0019e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af4800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2238c r4:84b22000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2238c r4:84b4aa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af4800 r8:84b4aaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4aa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4aa80 r8:8027ed34 r7:e0009e60 r6:84b58800 r5:84af4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0019fb0 to 0xe0019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846e2780 INFO: task kworker/0:140:3532 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a4b9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:3534 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:3534 tgid:3534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0021d84 r8:00000002 r7:60000013 r6:e0021d8c r5:84af0c00 r4:84af0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdfd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2278c r4:84b22400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2278c r4:84b4ab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af0c00 r8:84b4ab2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4ab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4ab00 r8:8027ed34 r7:e0009e60 r6:84b58880 r5:84af0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0021fb0 to 0xe0021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e1c0 INFO: task kworker/0:141:3534 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8aa4c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:3536 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:3536 tgid:3536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:84af6000 r4:84af6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af6000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b22b8c r4:84b22800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b22b8c r4:84b4ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af6000 r8:84b4abac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4ab80 r8:8027ed34 r7:e0009e60 r6:84b58900 r5:84af6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e100 INFO: task kworker/0:142:3536 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8aa4c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:3538 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:3538 tgid:3538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0031d84 r8:00000002 r7:60000113 r6:e0031d8c r5:84af5400 r4:84af5400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af5400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0031e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b22f8c r4:84b22c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b22f8c r4:84b4ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af5400 r8:84b4ac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4ac00 r8:8027ed34 r7:e0009e60 r6:84b58980 r5:84af5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0031fb0 to 0xe0031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e200 INFO: task kworker/0:143:3538 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8aebc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:3540 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe9d84 r8:00000002 r7:60000013 r6:dffe9d8c r5:848ab000 r4:848ab000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ab000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e680 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:848ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2338c r4:84b23000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2338c r4:84b4ac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ab000 r8:84b4acac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4ac80 r8:8027ed34 r7:e0009e60 r6:84b4ad00 r5:848ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe9fb0 to 0xdffe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e3c0 INFO: task kworker/0:144:3540 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8b738000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 r4:00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e980 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e003f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b23b8c r4:84b23800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b23b8c r4:84b4ad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:84b4adac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4ad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4ad80 r8:8027ed34 r7:e0009e60 r6:84b4ae00 r5:8476b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e600 INFO: task kworker/0:145:3543 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82abe1e4 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:3545 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:3545 tgid:3545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0039d84 r8:00000002 r7:60000013 r6:e0039d8c r5:849c0c00 r4:849c0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5eb40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0047000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b23f8c r4:84b23c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b23f8c r4:84b4ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:84b4aeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e780 INFO: task kworker/0:146:3545 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8bb9f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ecc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e004f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2438c r4:84b24000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2438c r4:84b4af80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0000 r8:84b4afac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4af80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4af80 r8:8027ed34 r7:e0039e60 r6:84b6a000 r5:849c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:147:3547 is blocked on a mutex likely owned by task kworker/0:129:3505. 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0065e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5edc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2478c r4:84b24400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2478c r4:84b6a080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c2400 r8:84b6a0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a080 r8:8027ed34 r7:dffc9e60 r6:84b6a100 r5:849c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0065fb0 to 0xe0065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5eac0 INFO: task kworker/0:148:3549 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8c116000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:149 state:D stack:0 pid:3551 tgid:3551 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ef80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b24b8c r4:84b24800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b24b8c r4:84b6a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3000 r8:84b6a1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a180 r8:8027ed34 r7:e0065e60 r6:84b6a200 r5:849c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0059fb0 to 0xe0059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5eec0 INFO: task kworker/0:149:3551 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8c620000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8587db8c r4:8587d800 r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:150:3553 blocked for more than 453 seconds. [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0077000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b24f8c r4:84b24c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b24f8c r4:84b6a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af8000 r8:84b6a2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a280 r8:8027ed34 r7:e0059e60 r6:84b58a00 r5:84af8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0081fb0 to 0xe0081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b55cc0 INFO: task kworker/0:150:3553 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8c8ff000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Exception stack(0xdffd5fb0 to 0xdffd5ff8) r4:84b48100 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0091e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e00d7000 r7:dddced40 r6:83018000 r5:84b2638c r4:84b6a300 1fa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:3557 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:3557 tgid:3557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00a1d84 r8:00000002 r7:60000113 r6:e00a1d8c r5:84afb000 r4:84afb000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afb000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48740 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84afb000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0087000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84afb000 r8:84b6a3ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:3559 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:3559 tgid:3559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00add84 r8:00000002 r7:60000013 r6:e00add8c r5:84af8c00 r4:84af8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ade08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84af8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0097000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2578c r4:84b25400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2578c r4:84b6a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af8c00 r8:84b6a42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Call trace: r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8da27000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:154 state:D stack:0 pid:3560 tgid:3560 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73080 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84afa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b25b8c r4:84b25800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b25b8c r4:84b6a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afa400 r8:84b6a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a480 r8:8027ed34 r7:e0091e60 r6:84b58c00 r5:84afa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b1fb0 to 0xe00b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73080 INFO: task kworker/0:154:3560 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:84b48100 task:kworker/0:155 state:D stack:0 pid:3563 tgid:3563 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73480 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84afbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b25f8c r4:84b25c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b25f8c r4:84b6a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afbc00 r8:84b6a52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a500 r8:8027ed34 r7:e0091e60 r6:84b58c80 r5:84afbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d5fb0 to 0xe00d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e1e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84afc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2678c r4:84b26400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2678c r4:84b6a580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afc800 r8:84b6a5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a580 r8:8027ed34 r7:e0091e60 r6:84b58d00 r5:84afc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e1fb0 to 0xe00e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73440 INFO: task kworker/0:156:3565 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8e2dc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:3566 blocked for more than 453 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:3566 tgid:3566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:84afe000 r4:84afe000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afe000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84afe000 r8:84b6a62c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73440 INFO: task kworker/0:157:3566 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8e4ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b48100 task:kworker/0:158 state:D stack:0 pid:3568 tgid:3568 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03f5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84afd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b26b8c r4:84b26800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b26b8c r4:84b6a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afd400 r8:84b6a6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a680 r8:8027ed34 r7:e00e5e60 r6:84b58e00 r5:84afd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03f5fb0 to 0xe03f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73600 INFO: task kworker/0:158:3568 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84af6c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0405e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84af6c00 r8:84b6a72c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a700 r8:8027ed34 r7:e00e5e60 r6:84b58e80 r5:84af6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0405fb0 to 0xe0405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73680 INFO: task kworker/0:159:3570 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8eaca000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:3576 blocked for more than 454 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0425d84 r8:00000002 r7:60000013 r6:e0425d8c r5:84b01800 r4:84b01800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b01800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0425e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84b01800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2778c r4:84b27400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2778c r4:84b6a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b01800 r8:84b6a7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a780 r8:8027ed34 r7:e00e5e60 r6:84b58f00 r5:84b01800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73d00 INFO: task kworker/0:160:3576 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 5d20: 8ecf2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:84b48100 r4:84b00c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0429e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73cc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84b00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb51000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b27b8c r4:84b27800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b27b8c r4:84b6a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b00c00 r8:84b6a82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a800 r8:8027ed34 r7:e0425e60 r6:84b58f80 r5:84b00c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0429fb0 to 0xe0429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73d00 INFO: task kworker/0:161:3577 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8eeec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r4:82abe1e4 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:162 state:D stack:0 pid:3578 tgid:3578 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e042de08 r5:84b2c38c r4:84b2c000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:829185c4 r9:e0435d84 r8:00000002 r7:60000113 r6:e0435d8c r5:84b03c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0435e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc69000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2c78c r4:84b2c400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2c78c r4:84b6a900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b03c00 r8:84b6a92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a900 r8:8027ed34 r7:e042de60 r6:84bc8080 r5:84b03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0435fb0 to 0xe0435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73d00 INFO: task kworker/0:163:3579 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:164:3581 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0439d84 r8:00000002 r7:60000013 r6:e0439d8c r5:84b00000 r4:84b00000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b00000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0439e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfbc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84b00000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2d38c r4:84b2d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2d38c r4:84b6a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b00000 r8:84b6a9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a980 r8:8027ed34 r7:e0435e60 r6:84bc8100 r5:84b00000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0439fb0 to 0xe0439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73d00 INFO: task kworker/0:164:3581 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8f906000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcd300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f1f8c r4:842f1c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f1f8c r4:84bc8180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b04800 r8:84bc81ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8180 r8:8027ed34 r7:dfd71e60 r6:84bc8200 r5:84b04800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcd000 INFO: task kworker/1:80:3584 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:81 state:D stack:0 pid:3585 tgid:3585 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b05400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc03000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f2b8c r4:842f2800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f2b8c r4:84bc8280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b05400 r8:84bc82ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8280 r8:8027ed34 r7:e0431e60 r6:84bc8300 r5:84b05400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d1fb0 to 0xe00d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcd240 INFO: task kworker/1:81:3585 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 5d60: 800d0113 ffffffff r4:dffd5dc0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcd5c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b06000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9038c r4:84b90000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9038c r4:84bc8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b06000 r8:84bc83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8380 r8:8027ed34 r7:e00d1e60 r6:84bc8400 r5:84b06000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0075fb0 to 0xe0075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcd280 INFO: task kworker/1:82:3588 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:3590 blocked for more than 454 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:3590 tgid:3590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0441d84 r8:00000002 r7:60000113 r6:e0441d8c r5:84b06c00 r4:84b06c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b06c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0441e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84b06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc51000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b90b8c r4:84b90800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b90b8c r4:84bc8480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b06c00 r8:84bc84ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8480 r8:8027ed34 r7:e0075e60 r6:84bc8500 r5:84b06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0441fb0 to 0xe0441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcd440 INFO: task kworker/1:83:3590 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:84 state:D stack:0 pid:3592 tgid:3592 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e043de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfc33000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9078c r4:84b90400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9078c r4:84bc8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af3000 r8:84bc85ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8580 r8:8027ed34 r7:e0441e60 r6:84bc8600 r5:84af3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcd540 INFO: task kworker/1:84:3592 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 904a2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 INFO: task kworker/1:85:3594 blocked for more than 454 seconds. Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0449e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b90f8c r4:84b90c00 r10:61c88647 r9:84afec00 r8:84bc86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84bc8680 r8:8027ed34 r7:e0441e60 r6:84bc8700 r5:84afec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0449fb0 to 0xe0449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcd640 INFO: task kworker/1:85:3594 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 906e7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 r4:00000000 r4:84b4a480 INFO: task kworker/1:86:3597 blocked for more than 454 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0445e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Workqueue: events bpf_prog_free_deferred r5:85000c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e044de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85000c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2cf8c r4:84b2cc00 r4:84b6aa00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08 r5:00001000 r4:dfc9f000 Exception stack(0xe0455fb0 to 0xe0455ff8) Exception stack(0xdffd5d20 to 0xdffd5d68) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85002400 r4:829185c0 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85002400 r8:84bc8a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8a00 r8:8027ed34 r7:e0445e60 r6:84bc8a80 r5:85002400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcdd40 INFO: task kworker/1:88:3602 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 91547000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3604 blocked for more than 454 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3604 tgid:3604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:85003000 r4:85003000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85003000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85003000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe23000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2cb8c r4:84b2c800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2cb8c r4:84bc8b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85003000 r8:84bc8b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8b00 r8:8027ed34 r7:e0451e60 r6:84bc8b80 r5:85003000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0459fb0 to 0xe0459ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r4:00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:dffd5dc0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:90:3605 blocked for more than 454 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc8c00 r8:8027ed34 r7:e0459e60 r6:84bc8c80 r5:85003c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0461fb0 to 0xe0461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7d080 INFO: task kworker/1:90:3605 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 91ab7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e045de08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bc8d00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 91ec1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3609 blocked for more than 454 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3609 tgid:3609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0469d84 r8:00000002 r7:60000113 r6:e0469d8c r5:849c6c00 r4:849c6c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c6c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0469e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7da00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b92b8c r4:84b92800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b92b8c r4:84bc8e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6c00 r8:84bc8e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8e00 r8:8027ed34 r7:e045de60 r6:84b6aa80 r5:849c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0469fb0 to 0xe0469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7d300 INFO: task kworker/1:92:3609 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) r4:84b48100 task:kworker/1:93 state:D stack:0 pid:3612 tgid:3612 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0465e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7d940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9278c r4:84b92400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9278c r4:84bc8e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6000 r8:84bc8eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8e80 r8:8027ed34 r7:e0469e60 r6:84b6ab00 r5:849c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7d3c0 INFO: task kworker/1:93:3612 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9256a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:3613 blocked for more than 454 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:3613 tgid:3613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e046dd84 r8:00000002 r7:60000113 r6:e046dd8c r5:849c4800 r4:849c4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbff00 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:167:3615 blocked for more than 454 seconds. r4:849c5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0471e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfdc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2d78c r4:84b2d400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2d78c r4:84b6ac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:84b6acac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6ac80 r8:8027ed34 r7:e046de60 r6:84b6ad00 r5:849c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0471fb0 to 0xe0471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf9c0 INFO: task kworker/0:167:3615 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0475e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75bc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2e78c r4:84b2e400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2e78c r4:84b6ad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3c00 r8:84b6adac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6ad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6ad80 r8:8027ed34 r7:e046de60 r6:84b6ae00 r5:849c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0475fb0 to 0xe0475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbfd80 INFO: task kworker/0:168:3618 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 930dd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:94:3621 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:94 state:D stack:0 pid:3621 tgid:3621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0485d84 r8:00000002 r7:60000113 r6:e0485d8c r5:849c1800 r4:849c1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0485e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7dfc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df915000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b93b8c r4:84b93800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b93b8c r4:84bc8f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bc8f00 r8:8027ed34 r7:e0469e60 r6:84b6ae80 r5:849c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0485fb0 to 0xe0485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7d880 INFO: task kworker/1:94:3621 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 r4:00000001 Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:3622 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:3622 tgid:3622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0489d84 r8:00000002 r7:60000113 r6:e0489d8c r5:84aee000 r4:84aee000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aee000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0489e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7db40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84aee000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b92f8c r4:84b92c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b92f8c r4:84bc8f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aee000 r8:84bc8fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc8f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8f80 r8:8027ed34 r7:e0485e60 r6:84b6af00 r5:84aee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0489fb0 to 0xe0489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7d880 INFO: task kworker/1:95:3622 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9379c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:3624 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:3624 tgid:3624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84558000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84558000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b75080 INFO: task kworker/0:169:3624 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 93ed2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84b48100 task:kworker/1:96 state:D stack:0 pid:3626 tgid:3626 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7dd80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84558c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0493000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9338c r4:84b93000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9338c r4:84b7c000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84558c00 r8:84b7c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7c000 r8:8027ed34 r7:e0485e60 r6:84b78080 r5:84558c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0491fb0 to 0xe0491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7d880 INFO: task kworker/1:96:3626 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8455b000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7dd00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8455b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b93f8c r4:84b93c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b93f8c r4:84b7c100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8455b000 r8:84b7c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7c100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7c100 r8:8027ed34 r7:e0485e60 r6:84b78100 r5:8455b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0055fb0 to 0xe0055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7df40 INFO: task kworker/1:97:3631 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94135000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) r4:84b48100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85005400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85005400 r8:84b7c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7c180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7c180 r8:8027ed34 r7:e0055e60 r6:84b7c200 r5:85005400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0481fb0 to 0xe0481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7df40 INFO: task kworker/1:98:3633 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9427b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:99 state:D stack:0 pid:3634 tgid:3634 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfa11000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94cf7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:100:3635 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:100 state:D stack:0 pid:3635 tgid:3635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0061d84 r8:00000002 r7:60000113 r6:e0061d8c r5:85006000 r4:85006000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85006000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b76580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85006000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9d78c r4:84b9d400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9d78c r4:84b7c380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:101:3636 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:101 state:D stack:0 pid:3636 tgid:3636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84b03000 r4:84b03000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b03000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b76040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b03000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa49000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b7c480 r8:8027ed34 r7:e0061e60 r6:84b7c500 r5:84b03000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 5d20: 94f8b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:102:3639 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:102 state:D stack:0 pid:3639 tgid:3639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0071d84 r8:00000002 r7:60000113 r6:e0071d8c r5:847d8000 r4:847d8000 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0071e08 r4:00000000 r5:00001000 r4:dfa85000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0071fb0 to 0xe0071ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 5d20: 9567b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:103:3641 blocked for more than 455 seconds. task:kworker/1:103 state:D stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e007de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfab5000 r7:ddde2d40 r6:83018200 r5:84b9cf8c r4:84b7c680 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 9571a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:3642 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:3642 tgid:3642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e008dd84 r8:00000002 r7:60000013 r6:e008dd8c r5:847d9800 r4:847d9800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847d9800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75d00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2eb8c r4:84b2e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2eb8c r4:84b78180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d9800 r8:84b781ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78180 r8:8027ed34 r7:e0475e60 r6:84b7c780 r5:847d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe008dfb0 to 0xe008dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b75840 INFO: task kworker/0:170:3642 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800d0113 ffffffff r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:e009dd84 r8:00000002 r7:60000113 r6:e009dd8c r5:847da400 r4:847da400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847da400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b768c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847da400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff37000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9d38c r4:84b9d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9d38c r4:84b7c800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847da400 r8:84b7c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7c800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7c800 r8:8027ed34 r7:e0061e60 r6:84b7c880 r5:847da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe009dfb0 to 0xe009dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b76480 INFO: task kworker/1:104:3645 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 95f87000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:3647 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:3647 tgid:3647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00cdd84 r8:00000002 r7:60000013 r6:e00cdd8c r5:847db000 r4:847db000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847db000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75e00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847db000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd31000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2ef8c r4:84b2ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe00cdfb0 to 0xe00cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:3649 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:3649 tgid:3649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e03fdd84 r8:00000002 r7:60000013 r6:e03fdd8c r5:847dbc00 r4:847dbc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847dbc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03fde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b26f8c r4:84b26c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b26f8c r4:84b78280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dbc00 r8:84b782ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78280 r8:8027ed34 r7:e00cde60 r6:84b7c980 r5:847dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03fdfb0 to 0xe03fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b75c00 INFO: task kworker/0:172:3649 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 96616000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:3650 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:3650 tgid:3650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e040dd84 r8:00000002 r7:60000113 r6:e040dd8c r5:847dd400 r4:847dd400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847dd400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e040de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75fc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd85000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2f38c r4:84b2f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2f38c r4:84b78300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dd400 r8:84b7832c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78300 r8:8027ed34 r7:e03fde60 r6:84b7ca00 r5:847dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe040dfb0 to 0xe040dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b75c00 INFO: task kworker/0:173:3650 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9685b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:3652 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:3652 tgid:3652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04add84 r8:00000002 r7:60000013 r6:e04add8c r5:847dc800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 96c7d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:3654 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b5e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfde1000 r5:84b2fb8c r4:84b2f800 r10:61c88647 r9:847de000 r8:84b7842c r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:175:3654 is blocked on a mutex likely owned by task kworker/0:129:3505. r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r5:800d0113 r4:80239bd0 r4:dffd5dc0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:3656 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04bdd84 r8:00000002 r7:60000013 r6:e04bdd8c r5:85010c00 r4:85010c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85010c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04bde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85010c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff01000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2ff8c r4:84b2fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2ff8c r4:84b78480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010c00 r8:84b784ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78480 r8:8027ed34 r7:e03fde60 r6:84b7cb80 r5:85010c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b75900 INFO: task kworker/0:176:3656 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 974b3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:3659 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04c5d84 r8:00000002 r7:60000013 r6:e04c5d8c r5:85012400 r4:85012400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85012400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85012400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e003b000 r5:84b3478c r4:84b34400 r10:00000000 r9:84b78500 r8:8027ed34 r7:e03fde60 r6:84b7cc00 r5:85012400 r4:84bbf100 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 974b3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8455bc00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b3438c r4:84b34000 r10:61c88647 r9:8455bc00 r8:84b785ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78580 r8:8027ed34 r7:e04c5e60 r6:84b78600 r5:8455bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf100 INFO: task kworker/0:178:3660 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 979d6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8455e000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04cde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8455e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df961000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f2f8c r4:842f2c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f2f8c r4:84b7cc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8455e000 r8:84b7ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7cc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7cc80 r8:8027ed34 r7:e0061e60 r6:84b78680 r5:8455e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04cdfb0 to 0xe04cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b76a80 INFO: task kworker/1:105:3663 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 979d6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:106:3664 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:106 state:D stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04d1d84 r8:00000002 r7:60000113 r6:e04d1d8c r5:8455c800 r4:8455c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8455c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcde40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8455c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b76a80 INFO: task kworker/1:106:3664 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 98160000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b48100 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be79c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84559800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff65000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9eb8c r4:84b9e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9eb8c r4:84b7cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84559800 r8:84b7cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7cd80 r8:8027ed34 r7:e04cde60 r6:84b78780 r5:84559800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: 98544000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:179 state:D stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d5e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8455d400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b34b8c r4:84b34800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b34b8c r4:84b78800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8455d400 r8:84b7882c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78800 r8:8027ed34 r7:e04c5e60 r6:84b78880 r5:8455d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d5fb0 to 0xe04d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d380 INFO: task kworker/0:179:3669 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800d0113 r4:80239bd0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:180:3672 blocked for more than 455 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:3672 tgid:3672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04e5d84 r8:00000002 r7:60000013 r6:e04e5d8c r5:85013000 r4:85013000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85013000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85013000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0067000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b34f8c r4:84b34c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b34f8c r4:84b78900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013000 r8:84b7892c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04e9d84 r8:00000002 r7:60000013 r6:e04e9d8c r5:85013c00 r4:85013c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85013c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b752c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85013c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0547000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b36b8c r4:84b36800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b36b8c r4:84b78980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013c00 r8:84b789ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78980 r8:8027ed34 r7:e04e5e60 r6:84b7ce80 r5:85013c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d380 INFO: task kworker/0:181:3673 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 99345000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:82abe1e4 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85015400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0089000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3538c r4:84b35000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3538c r4:84b78a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85015400 r8:84b78a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78a00 r8:8027ed34 r7:e04e9e60 r6:84b7cf00 r5:85015400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d380 INFO: task kworker/0:182:3674 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 800d0113 ffffffff [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6da80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85014800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3578c r4:84b35400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3578c r4:84b78a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85014800 r8:84b78aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78a80 r8:8027ed34 r7:e04e9e60 r6:84b7cf80 r5:85014800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d9c0 INFO: task kworker/0:183:3676 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:3678 tgid:3678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0501d84 r8:00000002 r7:60000013 r6:e0501d8c r5:85011800 r4:85011800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85011800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0501e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6dc00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85011800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b35b8c r4:84b35800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b35b8c r4:84b78b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84b78b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78b00 r8:8027ed34 r7:e04e9e60 r6:84b7c080 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0501fb0 to 0xe0501ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 99a14000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) r4:84b48100 task:kworker/0:185 state:D stack:0 pid:3680 tgid:3680 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:3682 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:3682 tgid:3682 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:847dec00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0529e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e04a5000 r7:dddced40 r6:83018000 r5:84b9df8c r4:84b78c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6dbc0 INFO: task kworker/0:186:3682 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9a155000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Exception stack(0xdffd5fb0 to 0xdffd5ff8) r4:84b48100 task:kworker/0:187 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6df00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85010000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3638c r4:84b36000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3638c r4:84b78c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010000 r8:84b78cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78c80 r8:8027ed34 r7:e04e9e60 r6:84bd0100 r5:85010000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6dc40 INFO: task kworker/0:187:3684 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9a155000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85016000 r8:84b78d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78d00 r8:8027ed34 r7:e04e9e60 r6:84bd0180 r5:85016000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6de00 INFO: task kworker/0:188:3687 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9ab5e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:189:3688 blocked for more than 456 seconds. [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b78d80 r8:8027ed34 r7:e04e9e60 r6:84bd0280 r5:85018000 r4:84b75780 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9ab5e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85019800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:3692 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0585d84 r8:00000002 r7:60000113 r6:e0585d8c r5:8501a400 r4:8501a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8501a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8501a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056f000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:3695 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05add84 r8:00000002 r7:60000113 r6:e05add8c r5:85018c00 r4:85018c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85018c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc65c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b37b8c r4:84b37800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b37b8c r4:84b78f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85018c00 r8:84b78f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78f00 r8:8027ed34 r7:e0581e60 r6:84bd0400 r5:85018c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc61c0 INFO: task kworker/0:192:3695 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9b571000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3696 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05b5d84 r8:00000002 r7:60000013 r6:e05b5d8c r5:8501c800 r4:8501c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8501c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b37f8c r4:84b37c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b37f8c r4:84b78f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501c800 r8:84b78fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b78f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b78f80 r8:8027ed34 r7:e05ade60 r6:84bd0480 r5:8501c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b5fb0 to 0xe05b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc6240 INFO: task kworker/0:193:3696 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9b8ee000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3699 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:3699 tgid:3699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05d1d84 r8:00000002 r7:60000013 r6:e05d1d8c r5:8501d400 r4:8501d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8501d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8501d400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3938c r4:84b39000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3938c r4:84bd4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501d400 r8:84bd402c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4000 r8:8027ed34 r7:e05b5e60 r6:84bd0500 r5:8501d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d1fb0 to 0xe05d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc6580 INFO: task kworker/0:194:3699 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9bcf0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8455a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a9e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc6780 INFO: task kworker/0:195:3700 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9c051000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc69c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8455ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r10:61c88647 r9:8455ec00 r8:84bd41ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84788000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84788000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05eb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b38b8c r4:84b38800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b38b8c r4:84bd4280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84788000 r8:84bd42ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:800d0113 r4:80239bd0 r4:82abe1e4 r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:198 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84788c00 r8:84bd43ac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc6b00 INFO: task kworker/0:198:3707 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9c735000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:3709 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0411e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b76500 r10:61c88647 r9:84789800 r8:84bd44ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:3711 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04c1d84 r8:00000002 r7:60000113 r6:e04c1d8c r5:8478b000 r4:8478b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8478b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc0c40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8478b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3978c r4:84b39400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3978c r4:84bd4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478b000 r8:84bd45ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4580 r8:8027ed34 r7:e0411e60 r6:84bd4600 r5:8478b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c1fb0 to 0xe04c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc6e00 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:e048dd84 r8:00000002 r7:60000013 r6:e048dd8c r5:8501e000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b39b8c r4:84b39800 r4:84bd4680 r10:00000000 r9:84bd4680 r8:8027ed34 r7:e04c1e60 r6:84bd0580 r5:8501e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe048dfb0 to 0xe048dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc6f40 INFO: task kworker/0:201:3713 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9d4b8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:202 state:D stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bd4700 r8:8027ed34 r7:e048de60 r6:84bd0600 r5:8501ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be41c0 INFO: task kworker/0:202:3716 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9d7fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b3b38c r4:84b3b000 r10:61c88647 r9:85020c00 r8:84bd47ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4780 r8:8027ed34 r7:e05fde60 r6:84bd0680 r5:85020c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0605fb0 to 0xe0605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be41c0 INFO: task kworker/0:203:3718 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 Exception stack(0xdffd5d20 to 0xdffd5d68) r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b3a38c r4:84b3a000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:3720 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:85022400 r4:85022400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85022400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r10:61c88647 r9:85022400 r8:84bd48ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:3722 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:3722 tgid:3722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0419d84 r8:00000002 r7:60000113 r6:e0419d8c r5:8478bc00 r4:8478bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8478bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0419e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be45c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8478bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc53000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3ab8c r4:84b3a800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3ab8c r4:84bd4900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478bc00 r8:84bd492c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4900 r8:8027ed34 r7:e0605e60 r6:84bd4980 r5:8478bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:3725 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0615d84 r8:00000002 r7:60000013 r6:e0615d8c r5:8478c800 r4:8478c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8478c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:207:3725 is blocked on a mutex likely owned by task kworker/0:129:3505. r4:82abe1e4 r4:00000000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:3726 tgid:3726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:8478d400 r4:8478d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8478d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4d40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8478d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe95000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3bf8c r4:84b3bc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3bf8c r4:84bd4b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478d400 r8:84bd4b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4b00 r8:8027ed34 r7:e0605e60 r6:84bd4b80 r5:8478d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0619fb0 to 0xe0619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r4:00000000 r5:8587db8c r4:8587d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b48100 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85024800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3b78c r4:84b3b400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b3b78c r4:84bd4c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85024800 r8:84bd4c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4c00 r8:8027ed34 r7:e0619e60 r6:84bd0800 r5:85024800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be4900 INFO: task kworker/0:209:3731 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 5d20: 9e981000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:e0629d84 r8:00000002 r7:60000113 r6:e0629d8c r5:85023c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 r4:00000000 r5:84b3bb8c r4:84b3b800 r10:00000000 r9:84bd4c80 r8:8027ed34 r7:e0619e60 r6:84bd0880 r5:85023c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: 9ed5b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:3734 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0631d84 r8:00000002 r7:60000113 r6:e0631d8c r5:85023000 r4:85023000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85023000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85023000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeaf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503838c r4:85038000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503838c r4:84bd4d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85023000 r8:84bd4d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4d00 r8:8027ed34 r7:e0619e60 r6:84bd0900 r5:85023000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be4ac0 INFO: task kworker/0:211:3734 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9efcf000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:3735 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0635d84 r8:00000002 r7:60000013 r6:e0635d8c r5:85026000 r4:85026000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85026000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 9f407000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:3737 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:3737 tgid:3737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0641d84 r8:00000002 r7:60000013 r6:e0641d8c r5:85025400 r4:85025400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85025400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be48c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85025400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503878c r4:85038400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503878c r4:84bd4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85025400 r8:84bd4e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4e00 r8:8027ed34 r7:e0635e60 r6:84bd0a00 r5:85025400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be4cc0 INFO: task kworker/0:213:3737 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9f646000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:82abe1e4 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:3739 blocked for more than 456 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0645d84 r8:00000002 r7:60000113 r6:e0645d8c r5:85026c00 r4:85026c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85026c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3240 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85026c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e041f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85038f8c r4:85038c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85038f8c r4:84bd4e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85026c00 r8:84bd4eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4e80 r8:8027ed34 r7:e0635e60 r6:84bd0a80 r5:85026c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be4f80 INFO: task kworker/0:214:3739 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9fb0d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xdffd5fb0 to 0xdffd5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:108 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9ef8c r4:84b9ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9ef8c r4:84bd0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85020000 r8:84bd0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd0b00 r8:8027ed34 r7:e04cde60 r6:84bd0b80 r5:85020000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be7b80 INFO: task kworker/1:108:3741 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9fbd0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:3743 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:3743 tgid:3743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e061dd84 r8:00000002 r7:60000013 r6:e061dd8c r5:8501bc00 r4:8501bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8501bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8501bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ff000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9f38c r4:84b9f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9f38c r4:84bd4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501bc00 r8:84bd4f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4f00 r8:8027ed34 r7:e0645e60 r6:84bd0c00 r5:8501bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe061dfb0 to 0xe061dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c3a40 INFO: task kworker/0:215:3743 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9ff2a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 r4:84b48100 Not tainted 6.16.0-rc3-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8501b000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851721c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8501b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9ff8c r4:84b9fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b9ff8c r4:84bd0c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501b000 r8:84bd0cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd0c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd0c80 r8:8027ed34 r7:e04cde60 r6:84bd0d00 r5:8501b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be7880 INFO: task kworker/1:109:3746 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a040d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 task:kworker/0:216 state:D stack:0 pid:3748 tgid:3748 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503978c r4:84bd4f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85028c00 r8:84bd4fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd4f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4f80 r8:8027ed34 r7:e0645e60 r6:84bd0d80 r5:85028c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf30c0 INFO: task kworker/0:216:3748 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a06f4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3750 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0669d84 r8:00000002 r7:60000013 r6:e0669d8c r5:85028000 r4:85028000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85028000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3340 r5:8503938c r4:85039000 r10:00000000 r9:84bef000 r8:8027ed34 r7:e0659e60 r6:84bd0e00 r5:85028000 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3752 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:8502b000 r4:8502b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502b000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0673000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85039b8c r4:85039800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85039b8c r4:84bef080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502b000 r8:84bef0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef080 r8:8027ed34 r7:e0659e60 r6:84bd0e80 r5:8502b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf30c0 INFO: task kworker/0:218:3752 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a0b85000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:3753 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:3753 tgid:3753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e067dd84 r8:00000002 r7:60000113 r6:e067dd8c r5:85029800 r4:85029800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85029800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85029800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0693000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503a38c r4:8503a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503a38c r4:84bef100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85029800 r8:84bef12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef100 r8:8027ed34 r7:e0671e60 r6:84bd0f00 r5:85029800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf30c0 INFO: task kworker/0:219:3753 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a11ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:84b4a480 r4:00000001 Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc3-syzkaller #0 task:kworker/0:220 state:D stack:0 pid:3755 tgid:3755 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3740 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502a400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85039f8c r4:85039c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85039f8c r4:84bef180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502a400 r8:84bef1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef180 r8:8027ed34 r7:e067de60 r6:84bd0f80 r5:8502a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3400 INFO: task kworker/0:220:3755 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a1323000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:3757 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:8502bc00 r4:8502bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503b38c r4:8503b000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503b38c r4:84bef200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502bc00 r8:84bef22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef200 r8:8027ed34 r7:e067de60 r6:84bd0200 r5:8502bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3500 INFO: task kworker/0:221:3757 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:3759 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:3759 tgid:3759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:8502c800 r4:8502c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502c800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503a78c r4:8503a400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503a78c r4:84bef280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502c800 r8:84bef2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef280 r8:8027ed34 r7:e069de60 r6:85076000 r5:8502c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3500 INFO: task kworker/0:222:3759 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a19b9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:3761 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06bdd84 r8:00000002 r7:60000113 r6:e06bdd8c r5:8502ec00 r4:8502ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06bde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3b00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503ab8c r4:8503a800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503ab8c r4:84bef300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502ec00 r8:84bef32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef300 r8:8027ed34 r7:e069de60 r6:85076080 r5:8502ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06bdfb0 to 0xe06bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3800 INFO: task kworker/0:223:3761 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a1b6e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 Call trace: r10:829185c4 r9:e041dd84 r8:00000002 r7:60000113 r6:e041dd8c r5:8478e000 r4:8478e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8478e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e041de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3c40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8478e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503af8c r4:8503ac00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503af8c r4:84bef380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478e000 r8:84bef3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef380 r8:8027ed34 r7:e069de60 r6:84bef400 r5:8478e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe041dfb0 to 0xe041dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3900 INFO: task kworker/0:224:3764 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a1e07000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:3766 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:3766 tgid:3766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:8478ec00 r4:8478ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8478ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7180 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8478ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503bb8c r4:8503b800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503bb8c r4:84bef480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478ec00 r8:84bef4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef480 r8:8027ed34 r7:e069de60 r6:84bef500 r5:8478ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3bc0 INFO: task kworker/0:225:3766 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a220d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:226:3767 blocked for more than 457 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:3767 tgid:3767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:8478a400 r4:8478a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8478a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8478a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503b78c r4:8503b400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503b78c r4:84bef580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478a400 r8:84bef5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef580 r8:8027ed34 r7:e06c9e60 r6:84bef600 r5:8478a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bf3bc0 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 5d60: 800d0113 ffffffff r4:82abe1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3770 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06edd84 r8:00000002 r7:60000013 r6:e06edd8c r5:84550c00 r4:84550c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84550c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84550c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504038c r4:85040000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504038c r4:84bef680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84550c00 r8:84bef6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef680 r8:8027ed34 r7:e06c9e60 r6:84bef700 r5:84550c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3f00 INFO: task kworker/0:227:3770 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a277c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:3772 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:3772 tgid:3772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06e1d84 r8:00000002 r7:60000013 r6:e06e1d8c r5:84551800 r4:84551800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84551800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079200 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84551800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503bf8c r4:8503bc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503bf8c r4:84bef780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84551800 r8:84bef7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef780 r8:8027ed34 r7:e06ede60 r6:84bef800 r5:84551800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85079080 INFO: task kworker/0:228:3772 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a277c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b4a480 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:84b48100 Not tainted 6.16.0-rc3-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:e070dd84 r8:00000002 r7:60000013 r6:e070dd8c r5:84552400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850794c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84552400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504078c r4:85040400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504078c r4:84bef880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84552400 r8:84bef8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef880 r8:8027ed34 r7:e06ede60 r6:84bef900 r5:84552400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850791c0 INFO: task kworker/0:229:3774 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a29f6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:3776 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0719d84 r8:00000002 r7:60000013 r6:e0719d8c r5:84553000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84553000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0727000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85040b8c r4:85040800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85040b8c r4:84bef980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84553000 r8:84bef9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef980 r8:8027ed34 r7:e070de60 r6:84befa00 r5:84553000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0719fb0 to 0xe0719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850792c0 INFO: task kworker/0:230:3776 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a35fa000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3778 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0725d84 r8:00000002 r7:60000013 r6:e0725d8c r5:84553c00 r4:84553c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84553c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84553c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85040f8c r4:85040c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85040f8c r4:84befa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84553c00 r8:84befaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84befa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befa80 r8:8027ed34 r7:e0719e60 r6:84befb00 r5:84553c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0725fb0 to 0xe0725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85079440 INFO: task kworker/0:231:3778 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a39fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3780 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:84554800 r4:84554800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84554800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079ac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84554800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0753000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504178c r4:85041400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504178c r4:84befb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84554800 r8:84befbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84befb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befb80 r8:8027ed34 r7:e0725e60 r6:84befc00 r5:84554800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85079680 INFO: task kworker/0:232:3780 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a39fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:3782 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:3782 tgid:3782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0745d84 r8:00000002 r7:60000013 r6:e0745d8c r5:84555400 r4:84555400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84555400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:84555400 r8:84befcac r7:82804d40 r6:dddced40 r5:dddced60 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:3783 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:3783 tgid:3783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0751d84 r8:00000002 r7:60000013 r6:e0751d8c r5:84556000 r4:84556000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84556000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079c80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84556000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:84556c00 r4:84556c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84556c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3fc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84556c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0787000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504238c r4:85042000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504238c r4:84befe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84556c00 r8:84befeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84befe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befe80 r8:8027ed34 r7:e0751e60 r6:84beff00 r5:84556c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85079d00 INFO: task kworker/0:235:3786 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:84b48100 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079d80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84550000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85041f8c r4:85041c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85041f8c r4:84beff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84550000 r8:84beffac r7:82804d40 r6:dddced40 r5:dddced60 r4:84beff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84beff80 r8:8027ed34 r7:e076de60 r6:8508c000 r5:84550000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0791fb0 to 0xe0791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85079cc0 INFO: task kworker/0:236:3787 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a4e2a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85042b8c r4:8508c080 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf3f00 INFO: task kworker/0:237:3790 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a5292000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:238 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0795e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84998c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e079f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504278c r4:85042400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504278c r4:8508c180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84998c00 r8:8508c1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508c180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c180 r8:8027ed34 r7:e077de60 r6:8508c200 r5:84998c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0795fb0 to 0xe0795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85091000 INFO: task kworker/0:238:3791 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a5292000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3795 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3795 tgid:3795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e079dd84 r8:00000002 r7:60000013 r6:e079dd8c r5:84999800 r4:84999800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091600 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84999800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa31000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504338c r4:85043000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504338c r4:8508c280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84999800 r8:8508c2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508c280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c280 r8:8027ed34 r7:e077de60 r6:8508c300 r5:84999800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe079dfb0 to 0xe079dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85091180 INFO: task kworker/0:239:3795 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a5fa7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8508c380 r8:8027ed34 r7:e079de60 r6:8508c400 r5:8499a400 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:3798 blocked for more than 457 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:3798 tgid:3798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04ddd84 r8:00000002 r7:60000013 r6:e04ddd8c r5:8499bc00 r4:8499bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8499bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85043b8c r4:85043800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85043b8c r4:8508c480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8508c480 r8:8027ed34 r7:e079de60 r6:8508c500 r5:8499bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04ddfb0 to 0xe04ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85091480 INFO: task kworker/0:241:3798 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a68b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b4a480 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8499c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091740 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8499c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504378c r4:85043400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504378c r4:8508c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499c800 r8:8508c5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c580 r8:8027ed34 r7:e04dde60 r6:8508c600 r5:8499c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0589fb0 to 0xe0589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850915c0 INFO: task kworker/0:242:3800 is blocked on a mutex likely owned by task kworker/0:129:3505. Workqueue: events bpf_prog_free_deferred 5d20: a70b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:3801 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:3801 tgid:3801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0535d84 r8:00000002 r7:60000113 r6:e0535d8c r5:8499e000 r4:8499e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091c40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 INFO: task kworker/0:244:3804 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05bdd84 r8:00000002 r7:60000113 r6:e05bdd8c r5:8499ec00 r4:8499ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091e40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8499ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504c38c r4:8504c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504c38c r4:8508c780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499ec00 r8:8508c7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508c780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c780 r8:8027ed34 r7:e0535e60 r6:8508c800 r5:8499ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05bdfb0 to 0xe05bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85091ac0 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:84b48100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0599d84 r8:00000002 r7:60000113 r6:e0599d8c r5:8499b000 r4:8499b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0599e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091f80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8499b000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504c78c r4:8504c400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504c78c r4:8508c880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499b000 r8:8508c8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508c880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c880 r8:8027ed34 r7:e05bde60 r6:8508c900 r5:8499b000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: a75c3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8499d400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0541e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079fc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8499d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeff000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504cb8c r4:8504c800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504cb8c r4:8508c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499d400 r8:8508c9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508c980 r8:8027ed34 r7:e0599e60 r6:8508ca00 r5:8499d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0541fb0 to 0xe0541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85091e00 INFO: task kworker/0:246:3809 is blocked on a mutex likely owned by task kworker/0:129:3505. Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:85033000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c0c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85033000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504cf8c r4:8504cc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504cf8c r4:8508ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85033000 r8:8508caac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ca80 r8:8027ed34 r7:e0541e60 r6:85076100 r5:85033000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85091f40 INFO: task kworker/0:247:3811 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a7cc4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:3812 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c140 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85030000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c2c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85034800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff35000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504d38c r4:8504d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504d38c r4:8508cb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85034800 r8:8508cbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508cb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508cb80 r8:8027ed34 r7:e05f1e60 r6:85076200 r5:85034800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07adfb0 to 0xe07adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8509c140 INFO: task kworker/0:249:3815 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a8968000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:3816 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07b1d84 r8:00000002 r7:60000013 r6:e07b1d8c r5:85033c00 r4:85033c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85033c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504df8c r4:8508cc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85033c00 r8:8508ccac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508cc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508cc80 r8:8027ed34 r7:e05f1e60 r6:85076280 r5:85033c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8509c140 INFO: task kworker/0:250:3816 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a8968000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85030c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:8587db8c r4:8587d800 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:3821 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:3821 tgid:3821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07b5d84 r8:00000002 r7:60000013 r6:e07b5d8c r5:849b0c00 r4:849b0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ca00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504e78c r4:8504e400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504e78c r4:8508cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0c00 r8:8508cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8508cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508cd00 r8:8027ed34 r7:e07b1e60 r6:8508cd80 r5:849b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b5fb0 to 0xe07b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800d0113 ffffffff r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:3822 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05d9d84 r8:00000002 r7:60000113 r6:e05d9d8c r5:849b1800 r4:849b1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: a9591000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07c1d84 r8:00000002 r7:60000013 r6:e07c1d8c r5:849b2400 r4:849b2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cf40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00db000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504f78c r4:8504f400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504f78c r4:8508cf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b2400 r8:8508cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8508cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508cf00 r8:8027ed34 r7:e07b5e60 r6:8508cf80 r5:849b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c1fb0 to 0xe07c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8509c880 INFO: task kworker/0:254:3825 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a98b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:255 state:D stack:0 pid:3827 tgid:3827 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:3828 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07edd84 r8:00000002 r7:60000013 r6:e07edd8c r5:85035400 r4:85035400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85035400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cc80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85035400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0099000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504ef8c r4:8504ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504ef8c r4:850ab100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85035400 r8:850ab12c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab100 r8:8027ed34 r7:e07c1e60 r6:85076380 r5:85035400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8509c980 INFO: task kworker/0:256:3828 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a9d2d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:257 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4809e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ce00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85036000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504f38c r4:8504f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504f38c r4:850ab180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85036000 r8:850ab1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab180 r8:8027ed34 r7:e07c1e60 r6:85076400 r5:85036000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4809fb0 to 0xe4809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8509cdc0 INFO: task kworker/0:257:3832 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aa372000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:3833 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84bf8f80 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aa50c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:3835 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:3835 tgid:3835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e481dd84 r8:00000002 r7:60000013 r6:e481dd8c r5:8502e000 r4:8502e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e481de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04af000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505038c r4:85050000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505038c r4:850ab280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502e000 r8:850ab2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab280 r8:8027ed34 r7:e480de60 r6:85076500 r5:8502e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe481dfb0 to 0xe481dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:260:3836 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:3836 tgid:3836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4821d84 r8:00000002 r7:60000113 r6:e4821d8c r5:8502d400 r4:8502d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4821e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504ff8c r4:8504fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504ff8c r4:850ab300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:850ab300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aabbe000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 INFO: task kworker/0:261:3839 blocked for more than 458 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4829e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe4829fb0 to 0xe4829ff8) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aabbe000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e482de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:3843 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4831d84 r8:00000002 r7:60000113 r6:e4831d8c r5:850f0000 r4:850f0000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f0000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4831e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851626c0 r4:00000000 r5:00001000 r4:e0521000 r10:61c88647 r9:850f0000 r8:850ab4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85162180 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:264 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4835d84 r8:00000002 r7:60000013 r6:e4835d8c r5:850f0c00 r4:850f0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4835e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb87000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505238c r4:85052000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505238c r4:850ab500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f0c00 r8:850ab52c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab500 r8:8027ed34 r7:e4831e60 r6:85076780 r5:850f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4835fb0 to 0xe4835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:eca19000 r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:265:3847 blocked for more than 458 seconds. r4:850f3000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4841e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505138c r4:85051000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505138c r4:850ab580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f3000 r8:850ab5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab580 r8:8027ed34 r7:e4835e60 r6:85076800 r5:850f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4841fb0 to 0xe4841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85162540 INFO: task kworker/0:265:3847 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r5:800d0113 r4:80239bd0 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4849e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8505178c r4:85051400 r10:00000000 r9:850ab600 r8:8027ed34 r7:e4835e60 r6:85076880 r5:850f1800 INFO: task kworker/0:266:3849 is blocked on a mutex likely owned by task kworker/0:129:3505. r5:800d0113 r4:80239bd0 r4:dffd5dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:3850 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:3850 tgid:3850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e484dd84 r8:00000002 r7:60000013 r6:e484dd8c r5:850f2400 r4:850f2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e484de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162a40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0577000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85051b8c r4:85051800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85051b8c r4:850ab680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f2400 r8:850ab6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab680 r8:8027ed34 r7:e4835e60 r6:85076900 r5:850f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe484dfb0 to 0xe484dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:267:3850 is blocked on a mutex likely owned by task kworker/0:129:3505. r5:800d0113 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:3853 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4851d84 r8:00000002 r7:60000013 r6:e4851d8c r5:850f4800 r4:850f4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4851e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84617d80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9fb8c r4:84b9f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9fb8c r4:850ab700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f4800 r8:850ab72c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:850ab700 r8:8027ed34 r7:e4835e60 r6:85076980 r5:850f4800 r4:85162900 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:3854 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfbb3000 r4:00000001 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 INFO: task kworker/1:110:3857 blocked for more than 458 seconds. r4:850f6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4845e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851722c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ef000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f278c r4:842f2400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f278c r4:85076a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f6000 r8:85076aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076a80 r8:8027ed34 r7:e04cde60 r6:85076b00 r5:850f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4845fb0 to 0xe4845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851720c0 INFO: task kworker/1:110:3857 is blocked on a mutex likely owned by task kworker/0:129:3505. r4:00000000 r4:82abe1e4 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/1:111:3861 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07bdd84 r8:00000002 r7:60000113 r6:e07bdd8c r5:850f6c00 r4:850f6c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f6c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f238c r4:842f2000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f238c r4:85076b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f6c00 r8:85076bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076b80 r8:8027ed34 r7:e04cde60 r6:85076c00 r5:850f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07bdfb0 to 0xe07bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:112:3863 blocked for more than 458 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:112 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4811d84 r8:00000002 r7:60000013 r6:e4811d8c r5:850f3c00 r4:850f3c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f3c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4811e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513578c r4:85135400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513578c r4:85076c80 r10:61c88647 r9:850f3c00 r8:85076cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ad5fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:113:3864 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85076d80 r8:8027ed34 r7:e4811e60 r6:85076e00 r5:850f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0681fb0 to 0xe0681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85172340 INFO: task kworker/1:113:3864 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: adb89000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:3866 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:850f9800 r4:850f9800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f9800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162c40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850f9800 r8:850ab82c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:84b48100 task:kworker/0:271 state:D stack:0 pid:3868 tgid:3868 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850fb000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc13000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85052f8c r4:85052c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85052f8c r4:850ab880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fb000 r8:850ab8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab880 r8:8027ed34 r7:e0691e60 r6:85076f00 r5:850fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851623c0 INFO: task kworker/0:271:3868 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800d0113 ffffffff r4:dffd5dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:3870 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:850fa400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850ab900 r8:8027ed34 r7:e06a1e60 r6:85076f80 r5:850fa400 INFO: task kworker/0:272:3870 is blocked on a mutex likely owned by task kworker/0:129:3505. 5d60: 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:273:3871 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:850fbc00 r4:850fbc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fbc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160900 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505838c r4:85058000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505838c r4:850ab980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fbc00 r8:850ab9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850ab980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ab980 r8:8027ed34 r7:e06b1e60 r6:8516e000 r5:850fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85160240 INFO: task kworker/0:273:3871 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aeaff000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 r4:00000000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850aba00 r8:8027ed34 r7:e06b9e60 r6:8516e080 r5:850fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85160100 INFO: task kworker/0:274:3873 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aed7a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:275:3875 blocked for more than 459 seconds. [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160540 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0679fb0 to 0xe0679ff8) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: af194000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:3878 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85053f8c r4:85053c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85053f8c r4:850abb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6000 r8:850abbac r7:82804d40 r6:dddced40 r5:dddced60 r4:850abb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850abb80 r8:8027ed34 r7:e06b9e60 r6:850abc00 r5:849b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85160580 INFO: task kworker/0:276:3878 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: af757000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85160580 INFO: task kworker/0:277:3879 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: af7bd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:3882 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160b00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85058b8c r4:85058800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85058b8c r4:850abd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:850abd80 r8:8027ed34 r7:e068de60 r6:8516e100 r5:850fc800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdffd5d20 to 0xdffd5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:3884 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4865d84 r8:00000002 r7:60000113 r6:e4865d8c r5:850f8c00 r4:850f8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4865e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:850f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505938c r4:85059000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:3885 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:3885 tgid:3885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4869d84 r8:00000002 r7:60000013 r6:e4869d8c r5:850fec00 r4:850fec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4869e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850abe80 r8:8027ed34 r7:e4865e60 r6:8516e200 r5:850fec00 r4:85160b80 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:3888 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:3888 tgid:3888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e486dd84 r8:00000002 r7:60000113 r6:e486dd8c r5:850fe000 r4:850fe000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fe000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e486de08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:850fe000 r8:850abf2c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:3889 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:3889 tgid:3889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4871d84 r8:00000002 r7:60000113 r6:e4871d8c r5:85100000 r4:85100000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85100000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4871e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505af8c r4:8505ac00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505af8c r4:850abf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85100000 r8:850abfac r7:82804d40 r6:dddced40 r5:dddced60 r4:850abf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850abf80 r8:8027ed34 r7:e4865e60 r6:8516e300 r5:85100000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4871fb0 to 0xe4871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85160b80 INFO: task kworker/0:282:3889 is blocked on a mutex likely owned by task kworker/0:129:3505. Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:283:3891 blocked for more than 459 seconds. Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4879d84 r8:00000002 r7:60000013 r6:e4879d8c r5:85101800 r4:85101800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85101800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4879e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160fc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85101800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0415000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505978c r4:85059400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505978c r4:8517c000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85101800 r8:8517c02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c000 r8:8027ed34 r7:e4871e60 r6:8516e380 r5:85101800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4879fb0 to 0xe4879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85160d40 INFO: task kworker/0:283:3891 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:3893 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8889d84 r8:00000002 r7:60000113 r6:e8889d8c r5:85100c00 r4:85100c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85100c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8889e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85100c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0499000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059b8c r4:85059800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85059b8c r4:8517c080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85100c00 r8:8517c0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c080 r8:8027ed34 r7:e4871e60 r6:8516e400 r5:85100c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8889fb0 to 0xe8889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85162ec0 INFO: task kworker/0:284:3893 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b144d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 r4:85102400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d0c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85102400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ff000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059f8c r4:85059c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85059f8c r4:8517c100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85102400 r8:8517c12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c100 r8:8027ed34 r7:e4871e60 r6:8516e480 r5:85102400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8891fb0 to 0xe8891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d040 INFO: task kworker/0:285:3895 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 800d0113 ffffffff r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:286:3897 blocked for more than 459 seconds. [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e889de08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85103000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505a38c r4:8505a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505a38c r4:8517c180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85103000 r8:8517c1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c180 r8:8027ed34 r7:e4871e60 r6:8516e500 r5:85103000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe889dfb0 to 0xe889dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d040 INFO: task kworker/0:286:3897 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b1b0a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:287 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85103c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d480 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85103c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505a78c r4:8505a400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505a78c r4:8517c200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85103c00 r8:8517c22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c200 r8:8027ed34 r7:e4871e60 r6:8516e580 r5:85103c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a5fb0 to 0xe88a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d400 INFO: task kworker/0:287:3899 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b212d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b4a480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:288 state:D stack:0 pid:3901 tgid:3901 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ade08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:85104800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505ab8c r4:8505a800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505ab8c r4:8517c280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85104800 r8:8517c2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c280 r8:8027ed34 r7:e4871e60 r6:8516e600 r5:85104800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88adfb0 to 0xe88adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d280 INFO: task kworker/0:288:3901 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xdffd5d20 to 0xdffd5d68) r5:800d0113 r4:80239bd0 r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:3904 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e88b1d84 r8:00000002 r7:60000113 r6:e88b1d8c r5:85106000 r4:85106000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85106000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d600 INFO: task kworker/0:289:3904 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b26d5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d980 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85106c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505b78c r4:8505b400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505b78c r4:8517c380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85106c00 r8:8517c3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c380 r8:8027ed34 r7:e88b1e60 r6:8516e700 r5:85106c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b5fb0 to 0xe88b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d600 INFO: task kworker/0:290:3906 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b2880000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) Not tainted 6.16.0-rc3-syzkaller #0 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dac0 r9:83018005 r8:85105400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505bb8c r4:8505b800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505bb8c r4:8517c400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85105400 r8:8517c42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c400 r8:8027ed34 r7:e88b5e60 r6:8516e780 r5:85105400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b9fb0 to 0xe88b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d800 INFO: task kworker/0:291:3908 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b29d4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:292 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c5e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:85108000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0789000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505c38c r4:8505c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505c38c r4:8517c480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85108000 r8:8517c4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c480 r8:8027ed34 r7:e88b9e60 r6:8516e800 r5:85108000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88c5fb0 to 0xe88c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d940 INFO: task kworker/0:292:3909 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b2d9d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:293:3911 blocked for more than 459 seconds. Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a9e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85134b8c r4:85134800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85134b8c r4:8517c500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0000 r8:8517c52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c500 r8:8027ed34 r7:e88c5e60 r6:8517c580 r5:849b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a9fb0 to 0xe88a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d780 INFO: task kworker/0:293:3911 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b2f65000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:294 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c9e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0775000 r10:61c88647 r9:849b3c00 r8:8517c62c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517db40 INFO: task kworker/0:294:3914 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b32d8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:295:3917 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b35b5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 INFO: task kworker/0:296:3921 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e88cdd84 r8:00000002 r7:60000113 r6:e88cdd8c r5:84748000 r4:84748000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84748000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88cde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162b80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84748000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df96f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505cb8c r4:8505c800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505cb8c r4:8517c800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe88cdfb0 to 0xe88cdff8) INFO: task kworker/0:296:3921 is blocked on a mutex likely owned by task kworker/0:129:3505. r5:800d0113 r4:80239bd0 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:e0721d84 r8:00000002 r7:60000113 r6:e0721d8c r5:84748c00 r4:84748c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84748c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84748c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaed000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505d38c r4:8505d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505d38c r4:8517c900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84748c00 r8:8517c92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517c900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517c900 r8:8027ed34 r7:e88cde60 r6:8517c980 r5:84748c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:3923 blocked for more than 459 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:3923 tgid:3923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07f9d84 r8:00000002 r7:60000113 r6:e07f9d8c r5:84749800 r4:84749800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84749800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84749800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa91000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505cf8c r4:8505cc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505cf8c r4:8517ca00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84749800 r8:8517ca2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ca00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:114:3924 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:114 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4805d84 r8:00000002 r7:60000113 r6:e4805d8c r5:8474a400 r4:8474a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4805e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85180780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8474a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513538c r4:85135000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8516e880 r8:8027ed34 r7:e4811e60 r6:8517cb00 r5:8474a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:dffd5dc0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3926 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4839d84 r8:00000002 r7:60000013 r6:e4839d8c r5:8474b000 r4:8474b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4839e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851967c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8474b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0043000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513678c r4:85136400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513678c r4:8516e900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474b000 r8:8516e92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516e900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516e900 r8:8027ed34 r7:e4811e60 r6:8517cb80 r5:8474b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4839fb0 to 0xe4839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85180840 INFO: task kworker/1:115:3926 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b42e0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:3928 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07a5d84 r8:00000002 r7:60000113 r6:e07a5d8c r5:8474bc00 r4:8474bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ab80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8474bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0001000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505df8c r4:8505dc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505df8c r4:8517cc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474bc00 r8:8517cc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517cc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r5:800d0113 r4:80239bd0 r4:dffd5dc0 r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:3929 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e88d5d84 r8:00000002 r7:60000113 r6:e88d5d8c r5:8474c800 r4:8474c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a600 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8474c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd05000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505d78c r4:8505d400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505d78c r4:8517cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474c800 r8:8517cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517cd00 r8:8027ed34 r7:e07a5e60 r6:8517cd80 r5:8474c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d5fb0 to 0xe88d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a200 INFO: task kworker/0:300:3929 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b4ad0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:3932 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r9:83018005 r8:8474d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff39000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505db8c r4:8505d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505db8c r4:8517ce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474d400 r8:8517ce2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517ce00 r8:8027ed34 r7:e07a5e60 r6:8517ce80 r5:8474d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf905fb0 to 0xdf905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a480 INFO: task kworker/0:301:3932 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r5:800d0113 r4:80239bd0 r4:dffd5dc0 r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88dde08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfded000 r5:85135b8c r4:85135800 r10:61c88647 r9:8474e000 r8:8516e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:8516e980 r8:8027ed34 r7:e4839e60 r6:8517cf00 r5:8474e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88ddfb0 to 0xe88ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85196180 INFO: task kworker/1:116:3934 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b4f44000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:117 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84760000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff13000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85135f8c r4:85135c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85135f8c r4:8516ea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84760000 r8:8516ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516ea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516ea00 r8:8027ed34 r7:e4839e60 r6:8517cf80 r5:84760000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e5fb0 to 0xe88e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85196240 INFO: task kworker/1:117:3937 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b50ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e9e08 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8516ea80 Exception stack(0xe88e9fb0 to 0xe88e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851962c0 INFO: task kworker/1:118:3938 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b551a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:302 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:e88e1d84 r8:00000002 r7:60000113 r6:e88e1d8c r5:84761800 r4:84761800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84761800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518bc40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84761800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505e78c r4:8505e400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505e78c r4:8518f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84761800 r8:8518f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518f080 r8:8027ed34 r7:e07a5e60 r6:8518f100 r5:84761800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e1fb0 to 0xe88e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518aa00 INFO: task kworker/0:302:3941 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b57e3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:8587db8c r4:8587d800 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:303 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e88d9d84 r8:00000002 r7:60000113 r6:e88d9d8c r5:84762400 r4:84762400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84762400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518be80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84762400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e483d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505e38c r4:8505e000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505e38c r4:8518f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84762400 r8:8518f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518f180 r8:8027ed34 r7:e88e1e60 r6:8518f200 r5:84762400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:119:3945 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:119 state:D stack:0 pid:3945 tgid:3945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e88f5d84 r8:00000002 r7:60000113 r6:e88f5d8c r5:84763c00 r4:84763c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84763c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0095000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85136f8c r4:85136c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85136f8c r4:8516eb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84763c00 r8:8516eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516eb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516eb00 r8:8027ed34 r7:e4839e60 r6:8518f280 r5:84763c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88f5fb0 to 0xe88f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851965c0 INFO: task kworker/1:119:3945 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b5e98000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:120:3947 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:120 state:D stack:0 pid:3947 tgid:3947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea905d84 r8:00000002 r7:60000113 r6:ea905d8c r5:84763000 r5:84763000 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea905e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196900 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84763000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85136b8c r4:85136800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85136b8c r4:8516eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84763000 r8:8516ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516eb80 r8:8027ed34 r7:e88f5e60 r6:8518f300 r5:84763000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea905fb0 to 0xea905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85196780 INFO: task kworker/1:120:3947 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b6037000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:121 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea90de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84766000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8513778c r4:8516ec00 r10:00000000 r9:8516ec00 r8:8027ed34 r7:e88f5e60 r6:8518f380 r5:84766000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b63c8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 INFO: task kworker/1:122:3950 blocked for more than 460 seconds. r10:829185c4 r9:ea911d84 r8:00000002 r7:60000013 r6:ea911d8c r5:84764800 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84764800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8513738c r4:85137000 r4:8516ec80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:123:3953 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:123 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea921d84 r8:00000002 r7:60000113 r6:ea921d8c r5:84798c00 r4:84798c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84798c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196e00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84798c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0409000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85137b8c r4:85137800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85137b8c r4:8516ed00 r10:61c88647 r9:84798c00 r8:8516ed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xea921fb0 to 0xea921ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85196c00 INFO: task kworker/1:123:3953 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b692e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:124:3954 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829185c4 r9:ea925d84 r8:00000002 r7:60000113 r6:ea925d8c r5:84799800 r4:84799800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84799800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea925e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518af00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84799800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513c38c r4:8513c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513c38c r4:8516ed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84799800 r8:8516edac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516ed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516ed80 r8:8027ed34 r7:ea921e60 r6:8518f500 r5:84799800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffd5fb0 to 0xdffd5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84798000 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84798000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85137f8c r4:85137c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85137f8c r4:8516ee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84798000 r8:8516ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516ee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516ee00 r8:8027ed34 r7:ea925e60 r6:8518f580 r5:84798000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea92dfb0 to 0xea92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85196e40 INFO: task kworker/1:125:3956 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b7571000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:126:3958 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:126 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea935d84 r8:00000002 r7:60000113 r6:ea935d8c r5:8479a400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851960c0 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8516ee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516ee80 r8:8027ed34 r7:ea925e60 r6:8518f600 r5:8479a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea935fb0 to 0xea935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85196d00 INFO: task kworker/1:126:3958 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b7821000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479b000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea941e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179300 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516ef00 r8:8027ed34 r7:ea925e60 r6:8518f680 r5:8479b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea941fb0 to 0xea941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518af40 INFO: task kworker/1:127:3961 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b7a14000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:833aab80 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8516ef80 r8:8027ed34 r7:ea941e60 r6:833a6b00 r5:8510a400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85196e80 INFO: task kworker/1:128:3962 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b7c88000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:129:3965 blocked for more than 460 seconds. Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea93de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:8510b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r7:ddde2d40 r6:83018200 r5:8513cb8c r4:833a6a00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179000 INFO: task kworker/1:129:3965 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b7eb1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179500 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8510bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513d38c r4:8513d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513d38c r4:85174080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510bc00 r8:851740ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85174080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85174080 r8:8027ed34 r7:ea941e60 r6:85174100 r5:8510bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea94dfb0 to 0xea94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179240 INFO: task kworker/1:130:3967 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 5d60: 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:131:3968 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:131 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea951d84 r8:00000002 r7:60000113 r6:ea951d8c r5:8510c800 r4:8510c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8510c800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513d78c r4:8513d400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513d78c r4:85174180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510c800 r8:851741ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85174180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85174180 r8:8027ed34 r7:ea94de60 r6:85174200 r5:8510c800 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:132:3971 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:132 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea945d84 r8:00000002 r7:60000013 r6:ea945d8c r5:8510d400 r4:8510d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851794c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8510d400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513db8c r4:8513d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513db8c r4:85174280 r10:61c88647 r9:8510d400 r8:851742ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/1:133:3973 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea955d84 r8:00000002 r7:60000113 r6:ea955d8c r5:8510e000 r4:8510e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178ac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8510e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0767000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513eb8c r4:8513e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513eb8c r4:85174380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510e000 r8:851743ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85174380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85174380 r8:8027ed34 r7:ea945e60 r6:85174400 r5:8510e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea955fb0 to 0xea955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179680 INFO: task kworker/1:133:3973 is blocked on a mutex likely owned by task kworker/0:129:3505. Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3974 blocked for more than 460 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3974 tgid:3974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e88f1d84 r8:00000002 r7:60000013 r6:e88f1d8c r5:8510ec00 r4:8510ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 800d0113 ffffffff r4:00000000 r5:00001000 r4:eca19000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:135:3976 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:135 state:D stack:0 pid:3976 tgid:3976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea961d84 r8:00000002 r7:60000113 r6:ea961d8c r5:85108c00 r4:85108c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85108c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea961e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85108c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8513e78c r4:8513e400 r4:85174580 r10:00000000 r9:85174580 r8:8027ed34 r7:ea955e60 r6:85174600 r5:85108c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea961fb0 to 0xea961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179800 INFO: task kworker/1:135:3976 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b96d7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8474ec00 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518bb40 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8518f700 r8:8027ed34 r7:e88e1e60 r6:85174680 r5:8474ec00 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b983b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:136:3983 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:136 state:D stack:0 pid:3983 tgid:3983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:85110000 r4:85110000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85110000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110000 r8:8517472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85174700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85174700 r8:8027ed34 r7:ea955e60 r6:85174780 r5:85110000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0699fb0 to 0xe0699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179fc0 INFO: task kworker/1:136:3983 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:e06add84 r8:00000002 r7:60000013 r6:e06add8c r5:85110c00 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8518f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518f780 r8:8027ed34 r7:e0665e60 r6:85174800 r5:85110c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06adfb0 to 0xe06adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518be00 INFO: task kworker/0:305:3984 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b9cfc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r5:800d0113 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:306 state:D stack:0 pid:3985 tgid:3985 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b5c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85111800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc29000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505ef8c r4:8505ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505ef8c r4:8518f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85111800 r8:8518f82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518f800 r8:8027ed34 r7:e06ade60 r6:85174880 r5:85111800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:3988 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea969d84 r8:00000002 r7:60000013 r6:ea969d8c r5:85113c00 r4:85113c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85113c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b680 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85113c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc67000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505f38c r4:8505f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505f38c r4:8518f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85113c00 r8:8518f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518f880 r8:8027ed34 r7:e06ade60 r6:85174900 r5:85113c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b380 INFO: task kworker/0:307:3988 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:3990 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:3990 tgid:3990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea96dd84 r8:00000002 r7:60000113 r6:ea96dd8c r5:85114800 r4:85114800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85114800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea96de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b0c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85114800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505f78c r4:8505f400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505f78c r4:8518f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85114800 r8:8518f92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518f900 r8:8027ed34 r7:e06ade60 r6:85174980 r5:85114800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea96dfb0 to 0xea96dff8) dfa0: 00000000 00000000 00000000 00000000 r4:8518b500 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:3992 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea979d84 r8:00000002 r7:60000113 r6:ea979d8c r5:85115400 r4:85115400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85115400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea979e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b140 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85115400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe43000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505ff8c r4:8505fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505ff8c r4:8518f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r5:800d0113 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:3993 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:3993 tgid:3993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea97dd84 r8:00000002 r7:60000013 r6:ea97dd8c r5:85116000 r4:85116000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85116000 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xea97dfb0 to 0xea97dff8) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:3995 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea985d84 r8:00000002 r7:60000113 r6:ea985d8c r5:85112400 r4:85112400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85112400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84947280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85112400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:840cd38c r4:840cd000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:840cd38c r4:8518fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85112400 r8:8518faac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518fa80 r8:8027ed34 r7:ea97de60 r6:85174b00 r5:85112400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b8c0 INFO: task kworker/0:311:3995 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bac61000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdffd5fb0 to 0xdffd5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc3-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85116c00 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85116c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r10:61c88647 r9:85116c00 r8:8518fb2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xea98dfb0 to 0xea98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517a080 INFO: task kworker/0:312:3997 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bb16a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:3999 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:dddced40 r6:83018000 r5:8506c78c r4:8518fb80 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xea99dfb0 to 0xea99dff8) r4:8517a340 INFO: task kworker/0:314:4001 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bb77b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:8479d400 r8:8518fcac r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bb77b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506d38c r4:8506d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506d38c r4:8518fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8479e000 r8:8518fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518fd80 r8:8027ed34 r7:ea97de60 r6:8518fe00 r5:8479e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517a680 INFO: task kworker/0:316:4006 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bba29000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4007 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4007 tgid:4007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9a9d84 r8:00000002 r7:60000113 r6:ea9a9d8c r5:8479ec00 r4:8479ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8479ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ab40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8479ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06db000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506df8c r4:8506dc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506df8c r4:8518fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8479ec00 r8:8518feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518fe80 r8:8027ed34 r7:ea97de60 r6:8518ff00 r5:8479ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a9fb0 to 0xea9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517a680 INFO: task kworker/0:317:4007 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bbd19000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4010 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:8479bc00 r4:8479bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8479bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517aa00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8479bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506db8c r4:8506d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506db8c r4:8518ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8479bc00 r8:8518ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ff80 r8:8027ed34 r7:ea9a9e60 r6:8519a000 r5:8479bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9adfb0 to 0xea9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517a880 INFO: task kworker/0:318:4010 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bc046000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4012 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:8479c800 r4:8479c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8479c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517acc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8479c800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0703000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506e38c r4:8506e000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506e38c r4:8519a080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8479c800 r8:8519a0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519a080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519a080 r8:8027ed34 r7:ea9a9e60 r6:8519a100 r5:8479c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517a9c0 INFO: task kworker/0:319:4012 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bc2f7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:4013 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea965d84 r8:00000002 r7:60000013 r6:ea965d8c r5:84765400 r4:84765400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84765400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517aec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84765400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506e78c r4:8506e400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506e78c r4:8519a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84765400 r8:8519a1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519a180 r8:8027ed34 r7:ea9b1e60 r6:8519a200 r5:84765400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517aac0 INFO: task kworker/0:320:4013 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bc8a9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4016 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9b9d84 r8:00000002 r7:60000113 r6:ea9b9d8c r5:847f8c00 r4:847f8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4875000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506f38c r4:8506f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506f38c r4:8519a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f8c00 r8:8519a2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519a280 r8:8027ed34 r7:ea965e60 r6:8519a300 r5:847f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b9fb0 to 0xea9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517ad40 INFO: task kworker/0:321:4016 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bcadf000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4017 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4017 tgid:4017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:847f9800 r4:847f9800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f9800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e140 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847f9800 r8:8519a3ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: bcbc5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9c1d84 r8:00000002 r7:60000113 r6:ea9c1d8c r5:847f8000 r4:847f8000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f8000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0799000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506ef8c r4:8506ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506ef8c r4:8519a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f8000 r8:8519a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519a480 r8:8027ed34 r7:ea9b9e60 r6:8519a500 r5:847f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e1c0 INFO: task kworker/0:323:4020 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bcc85000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:137:4022 blocked for more than 461 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:137 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9b5d84 r8:00000002 r7:60000113 r6:ea9b5d8c r5:847fb000 r4:847fb000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847fb000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178000 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88d1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8513ef8c r4:85174d00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bcfbb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e840 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88a1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506fb8c r4:8506f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506fb8c r4:8519a600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fbc00 r8:8519a62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519a600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519a600 r8:8027ed34 r7:ea9b9e60 r6:8519a680 r5:847fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c5fb0 to 0xea9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e2c0 INFO: task kworker/0:324:4024 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4026 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4026 tgid:4026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9cdd84 r8:00000002 r7:60000113 r6:ea9cdd8c r5:847fd400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e580 r5:8506f78c r4:8506f400 r10:61c88647 r9:847fd400 r8:8519a72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519a700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519a700 r8:8027ed34 r7:ea9c5e60 r6:8519a780 r5:847fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e500 INFO: task kworker/0:325:4026 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bd32c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:847fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r10:61c88647 r9:847fc800 r8:8519a82c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8519e6c0 INFO: task kworker/0:326:4028 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bd5fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:847fec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8519a900 r8:8027ed34 r7:ea9d1e60 r6:8519a980 r5:847fec00 r4:8519e6c0 Call trace: 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a9580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8511a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa43000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513f38c r4:8513f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513f38c r4:85174d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511a400 r8:85174dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85174d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85174d80 r8:8027ed34 r7:e0699e60 r6:85174e00 r5:8511a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851785c0 INFO: task kworker/1:138:4031 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bde0d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4034 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa01d84 r8:00000002 r7:60000013 r6:eaa01d8c r5:8511b000 r4:8511b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ef80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa07000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e4b8c r4:851e4800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e4b8c r4:8519aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9ddd84 r8:00000002 r7:60000013 r6:ea9ddd8c r5:847fe000 r4:847fe000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847fe000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9dde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ee40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e478c r4:851e4400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e478c r4:8519aa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fe000 r8:8519aaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519aa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519aa80 r8:8027ed34 r7:eaa01e60 r6:8519ab00 r5:847fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ec80 INFO: task kworker/0:329:4035 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: be49d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4038 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9f5d84 r8:00000002 r7:60000013 r6:ea9f5d8c r5:847fa400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7040 r5:851e538c r4:851e5000 r10:00000000 r9:8519ab80 r8:8027ed34 r7:eaa01e60 r6:8519ac00 r5:847fa400 INFO: task kworker/0:330:4038 is blocked on a mutex likely owned by task kworker/0:129:3505. 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 r5:8587db8c r4:8587d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:84766c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178f80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84766c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa13000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e4f8c r4:851e4c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e4f8c r4:8519ac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84766c00 r8:8519acac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519ac80 r8:8027ed34 r7:ea9f5e60 r6:8519ad00 r5:84766c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e9fb0 to 0xea9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e9c0 INFO: task kworker/0:331:4039 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: be8c2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b48100 task:kworker/0:332 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84868000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e578c r4:851e5400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e578c r4:8519ad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868000 r8:8519adac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519ad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519ad80 r8:8027ed34 r7:ea9f5e60 r6:8519ae00 r5:84868000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a7080 INFO: task kworker/0:332:4041 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) r5:800d0113 r4:80239bd0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:4045 tgid:4045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa1dd84 r8:00000002 r7:60000113 r6:eaa1dd8c r5:84868c00 r4:84868c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84868c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e638c r4:851e6000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e638c r4:8519ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868c00 r8:8519aeac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519ae80 r8:8027ed34 r7:eaa11e60 r6:8519af00 r5:84868c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a7180 INFO: task kworker/0:333:4045 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: bf05b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:334 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84869800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa37000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e5b8c r4:851e5800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e5b8c r4:8519af80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84869800 r8:8519afac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519af80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519af80 r8:8027ed34 r7:eaa1de60 r6:85174f00 r5:84869800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a72c0 INFO: task kworker/0:334:4046 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bf268000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa29d84 r8:00000002 r7:60000113 r6:eaa29d8c r5:8486a400 r4:8486a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7680 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8486a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e5f8c r4:851e5c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:139:4049 blocked for more than 462 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa4dd84 r8:00000002 r7:60000013 r6:eaa4dd8c r5:8511d400 r4:8511d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7a80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8511d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e6b8c r4:851e6800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e6b8c r4:851ae080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511d400 r8:851ae0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ae080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae080 r8:8027ed34 r7:e0699e60 r6:851ae100 r5:8511d400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:4052 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:4052 tgid:4052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa71d84 r8:00000002 r7:60000113 r6:eaa71d8c r5:8511bc00 r4:8511bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7e40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e778c r4:851e7400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e778c r4:851b0080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511bc00 r8:851b00ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0080 r8:8027ed34 r7:eaa1de60 r6:851ae180 r5:8511bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa71fb0 to 0xeaa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a7580 INFO: task kworker/0:336:4052 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bf9cb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:8511e000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851b0100 r8:8027ed34 r7:eaa71e60 r6:851ae200 r5:8511e000 r4:851a7580 Call trace: 5d20: bfc68000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r4:00000000 r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4055 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4055 tgid:4055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:85118000 r4:85118000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85118000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85118000 r8:851b01ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 r5:00001000 r4:eca19000 r4:84b4a480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa95d84 r8:00000002 r7:60000013 r6:eaa95d8c r5:8511c800 r4:8511c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7d00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e738c r4:851e7000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e738c r4:851b0200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511c800 r8:851b022c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0200 r8:8027ed34 r7:eaa71e60 r6:851ae300 r5:8511c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a7a40 INFO: task kworker/0:339:4058 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c08dd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:340 state:D stack:0 pid:4061 tgid:4061 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851b0280 r8:8027ed34 r7:eaa71e60 r6:851ae380 r5:8511ec00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a7cc0 INFO: task kworker/0:340:4061 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c0d87000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b4a480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829185c4 r9:eaa91d84 r8:00000002 r7:60000013 r6:eaa91d8c r5:8486bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: c1037000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:84b4a480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8486d400 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e9c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8486d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e7f8c r4:851e7c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e7f8c r4:851b0400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486d400 r8:851b042c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0400 r8:8027ed34 r7:eaaade60 r6:851b0480 r5:8486d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa41fb0 to 0xeaa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a7f00 INFO: task kworker/0:342:4064 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c1255000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8587db8c r4:8587d800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 r5:00001000 r4:eaadb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ec78c r4:851ec400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ec78c r4:851b0500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486b000 r8:851b052c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0500 r8:8027ed34 r7:eaaade60 r6:851b0580 r5:8486b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad1fb0 to 0xeaad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bf040 INFO: task kworker/0:343:4067 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c1442000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/1:140:4068 blocked for more than 462 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/1:141:4070 blocked for more than 462 seconds. Call trace: r5:85119800 r4:829185c0 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85119800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529038c r4:85290000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529038c r4:851ae500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85119800 r8:851ae52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ae500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae500 r8:8027ed34 r7:eaa59e60 r6:851ae580 r5:85119800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a9d80 INFO: task kworker/1:141:4070 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c1dfd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:344:4072 blocked for more than 462 seconds. r10:829185c4 r9:eaae9d84 r8:00000002 r7:60000113 r6:eaae9d8c r5:85120000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf600 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85120000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ecb8c r4:851ec800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ecb8c r4:851b0600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120000 r8:851b062c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0600 r8:8027ed34 r7:eaad1e60 r6:851ae600 r5:85120000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bf380 INFO: task kworker/0:344:4072 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c1fdd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:4074 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:85121800 r4:85121800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85121800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf900 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85121800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab07000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:345:4074 is blocked on a mutex likely owned by task kworker/0:129:3505. 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4076 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab05d84 r8:00000002 r7:60000013 r6:eab05d8c r5:85122400 r4:85122400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85122400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf740 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85122400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ecf8c r4:851ecc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ecf8c r4:851b0700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85122400 r8:851b072c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0700 r8:8027ed34 r7:eab01e60 r6:851ae700 r5:85122400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab05fb0 to 0xeab05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bf5c0 INFO: task kworker/0:346:4076 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4077 blocked for more than 462 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:85123000 r4:85123000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85123000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bfc00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85123000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851edb8c r4:851ed800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851edb8c r4:851b0780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123000 r8:851b07ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0780 r8:8027ed34 r7:eab01e60 r6:851ae780 r5:85123000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bf840 INFO: task kworker/0:347:4077 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:8587db8c r4:8587d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4080 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab1dd84 r8:00000002 r7:60000013 r6:eab1dd8c r5:85123c00 r4:85123c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85123c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bfa40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab13000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ed78c r4:851ed400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ed78c r4:851b0800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123c00 r8:851b082c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0800 r8:8027ed34 r7:eab11e60 r6:851ae800 r5:85123c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bf780 INFO: task kworker/0:348:4080 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c2bcd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:349:4082 blocked for more than 463 seconds. [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eab33000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851edf8c r4:851edc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851edf8c r4:851b0880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85124800 r8:851b08ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0880 r8:8027ed34 r7:eab11e60 r6:851ae880 r5:85124800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab29fb0 to 0xeab29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bfa80 INFO: task kworker/0:349:4082 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c2fbc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:350:4085 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4085 tgid:4085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:85126c00 r4:85126c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85126c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a98c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85126c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eeb8c r4:851ee800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85126c00 r8:851b092c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:4087 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:4087 tgid:4087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05c9d84 r8:00000002 r7:60000113 r6:e05c9d8c r5:85120c00 r4:85120c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85120c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bfe00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85120c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4088 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e88f9d84 r8:00000002 r7:60000013 r6:e88f9d8c r5:85126000 r4:85126000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85126000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85126000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ee78c r4:851ee400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ee78c r4:851b0a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126000 r8:851b0a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0a00 r8:8027ed34 r7:eab4de60 r6:851aea00 r5:85126000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88f9fb0 to 0xe88f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85125400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7cc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85125400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa55000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eef8c r4:851eec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851eef8c r4:851b0a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85125400 r8:851b0aac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0a80 r8:8027ed34 r7:eab4de60 r6:851aea80 r5:85125400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea919fb0 to 0xea919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bff80 INFO: task kworker/0:353:4091 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c3ca5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:354:4093 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4093 tgid:4093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab51d84 r8:00000002 r7:60000013 r6:eab51d8c r5:85109800 r4:85109800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85109800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c6100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85109800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ef38c r4:851ef000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ef38c r4:851b0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85109800 r8:851b0b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0b00 r8:8027ed34 r7:ea919e60 r6:851aeb00 r5:85109800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bf0c0 INFO: task kworker/0:354:4093 is blocked on a mutex likely owned by task kworker/0:129:3505. r4:82abe1e4 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:355:4095 blocked for more than 463 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851c61c0 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 r5:00001000 r4:dfd49000 r10:61c88647 r9:8486e000 r8:851b0cac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c44a2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4100 blocked for more than 463 seconds. task:kworker/0:357 state:D stack:0 pid:4100 tgid:4100 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dff11000 r10:61c88647 r9:8486c800 r8:851b0dac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6080 INFO: task kworker/0:357:4100 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c4813000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dff47000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f438c r4:851b0e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:851b0eac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b0e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b0e80 r8:8027ed34 r7:eab55e60 r6:851b0f00 r5:84830000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6080 INFO: task kworker/0:358:4101 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c4a5e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:8587db8c r4:8587d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:359 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851b0f80 r8:8027ed34 r7:eab5de60 r6:851c4000 r5:84830c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6600 INFO: task kworker/0:359:4103 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c4c19000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:360 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:851f4b8c r4:851c4080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:851c40ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4080 r8:8027ed34 r7:eab61e60 r6:851c4100 r5:84831800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6700 INFO: task kworker/0:360:4105 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c4ee6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 r5:8587db8c r4:8587d800 r4:84b4a480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:361:4107 blocked for more than 463 seconds. [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c6ac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0079000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f4f8c r4:851f4c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f4f8c r4:851c4180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:851c41ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4180 r8:8027ed34 r7:eab65e60 r6:851c4200 r5:84832400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6880 INFO: task kworker/0:361:4107 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c52ab000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:362:4110 blocked for more than 463 seconds. r10:829185c4 r9:eab59d84 r8:00000002 r7:60000013 r6:eab59d8c r5:84833c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f5b8c r4:851f5800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f5b8c r4:851c4280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833c00 r8:851c42ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4280 r8:8027ed34 r7:eab69e60 r6:851c4300 r5:84833c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6a40 INFO: task kworker/0:362:4110 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c553a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84834800 r8:851c43ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4380 r8:8027ed34 r7:eab59e60 r6:851c4400 r5:84834800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6b40 INFO: task kworker/0:363:4111 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c57df000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:364:4114 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab75d84 r8:00000002 r7:60000113 r6:eab75d8c r5:84836000 r4:84836000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84836000 r8:851c44ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4115 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab79d84 r8:00000002 r7:60000013 r6:eab79d8c r5:84836c00 r4:84836c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84836c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0579000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f678c r4:851f6400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f678c r4:851c4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836c00 r8:851c45ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4580 r8:8027ed34 r7:eab59e60 r6:851c4600 r5:84836c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d6000 INFO: task kworker/0:365:4115 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c5fea000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 r5:00001000 r4:eca19000 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:851f5f8c r4:851f5c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f5f8c r4:851c4680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84808000 r8:851c46ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851d6200 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r5:8587db8c r4:8587d800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800d0113 r4:80239bd0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:4122 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab6dd84 r8:00000002 r7:60000013 r6:eab6dd8c r5:8521a400 r4:8521a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6880 r5:851f6b8c r4:851f6800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851d6580 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:4123 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:4123 tgid:4123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:8521b000 r4:8521b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eac1f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2d80 INFO: task kworker/1:142:4123 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c6924000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:4125 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:4125 tgid:4125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:8521bc00 r4:8521bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6a80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8521bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4880 r8:8027ed34 r7:eab6de60 r6:851aed80 r5:8521bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab8dfb0 to 0xeab8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d6680 INFO: task kworker/0:369:4125 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c6b4f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8587db8c r4:8587d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 r10:829185c4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:8521c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d69c0 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f6f8c r4:851f6c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f6f8c r4:851c4900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521c800 r8:851c492c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4900 r8:8027ed34 r7:eab8de60 r6:851aee00 r5:8521c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d6680 INFO: task kworker/0:370:4126 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c70cc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc3-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800d0113 r4:80239bd0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:4131 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba5d84 r8:00000002 r7:60000113 r6:eaba5d8c r5:85218000 r4:85218000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85218000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852570c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85218000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fcf8c r4:851fcc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fcf8c r4:851c4a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218000 r8:851c4a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4a00 r8:8027ed34 r7:eab9de60 r6:851aef00 r5:85218000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d6a40 INFO: task kworker/0:372:4131 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:8521e000 r4:8521e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6c80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8521e000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea907000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdffd5fb0 to 0xdffd5ff8) Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:8521d400 r4:8521d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6e80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8521d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea927000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f7f8c r4:851f7c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f7f8c r4:851c4b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521d400 r8:851c4b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4b00 r8:8027ed34 r7:eaba5e60 r6:851ae000 r5:8521d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:4136 blocked for more than 463 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:4136 tgid:4136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:85220c00 r4:85220c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85220c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85220c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851c4b80 r4:00000001 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:376 state:D stack:0 pid:4138 tgid:4138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:85220000 r4:85220000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85220000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c6f40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:dffd5dc0 r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:377:4140 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851c4c80 r8:8027ed34 r7:eaba5e60 r6:85256100 r5:85221800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2300 INFO: task kworker/0:377:4140 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c7f07000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:4142 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:85222400 r4:85222400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85222400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257740 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85222400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac27000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fdf8c r4:851fdc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fdf8c r4:851c4d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85222400 r8:851c4d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4d00 r8:8027ed34 r7:eaba5e60 r6:85256180 r5:85222400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c6c80 INFO: task kworker/0:378:4142 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c8518000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:4144 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:4144 tgid:4144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:85223000 r4:85223000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85223000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabef000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fd38c r4:851fd000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fd38c r4:851c4d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223000 r8:851c4dac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4d80 r8:8027ed34 r7:eabe1e60 r6:85256200 r5:85223000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852571c0 INFO: task kworker/0:379:4144 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c8518000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:4147 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:85223c00 r4:85223c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85223c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabff000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fd78c r4:851fd400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fd78c r4:851c4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:851c4e00 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4148 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4148 tgid:4148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac19d84 r8:00000002 r7:60000013 r6:eac19d8c r5:85224800 r4:85224800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85224800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85224800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fdb8c r4:851fd800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fdb8c r4:851c4e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85224800 r8:851c4eac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4e80 r8:8027ed34 r7:eabe1e60 r6:85256300 r5:85224800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85257200 INFO: task kworker/0:381:4148 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c8b56000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4149 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:85226000 r4:85226000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85226000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85226000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac57000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851feb8c r4:851fe800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851feb8c r4:851c4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226000 r8:851c4f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4f00 r8:8027ed34 r7:eabe1e60 r6:85256380 r5:85226000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac1dfb0 to 0xeac1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852573c0 INFO: task kworker/0:382:4149 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c8b56000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:143:4154 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred r4:85226c00 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d0080 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85226c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85290f8c r4:85290c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85290f8c r4:85256400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226c00 r8:8525642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85256400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85256400 r8:8027ed34 r7:eaad9e60 r6:85256480 r5:85226c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85251f80 INFO: task kworker/1:143:4154 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c8fda000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:383:4155 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:85225400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85225400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fe38c r4:851fe000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fe38c r4:851c4f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85225400 r8:851c4fac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c4f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c4f80 r8:8027ed34 r7:eac1de60 r6:85256500 r5:85225400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852576c0 INFO: task kworker/0:383:4155 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c9173000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85228c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac47000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fe78c r4:851fe400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fe78c r4:8525e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228c00 r8:8525e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e000 r8:8027ed34 r7:eac1de60 r6:85256580 r5:85228c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852578c0 INFO: task kworker/0:384:4158 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82abe1e4 r4:00000000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fef8c r4:851fec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fef8c r4:8525e080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228000 r8:8525e0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e080 r8:8027ed34 r7:eac1de60 r6:85256600 r5:85228000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac65fb0 to 0xeac65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852579c0 INFO: task kworker/0:385:4160 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:8522a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ff38c r4:851ff000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ff38c r4:8525e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522a400 r8:8525e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e100 r8:8027ed34 r7:eac65e60 r6:85256680 r5:8522a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852579c0 INFO: task kworker/0:386:4161 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:144 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a380 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85229800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85290b8c r4:85290800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85290b8c r4:85256700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85229800 r8:8525672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85256700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85256700 r8:8027ed34 r7:eab85e60 r6:85256780 r5:85229800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526a040 INFO: task kworker/1:144:4164 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 5d60: 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:8587db8c r4:8587d800 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:387 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac89d84 r8:00000002 r7:60000013 r6:eac89d8c r5:8522c800 r4:8522c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526fa40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8522c800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb89000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520238c r4:85202000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520238c r4:8525e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522c800 r8:8525e1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e180 r8:8027ed34 r7:eac69e60 r6:85256800 r5:8522c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85257ac0 INFO: task kworker/0:387:4165 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c9e27000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8587db8c r4:8587d800 r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:4166 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:8522b000 r4:8522b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257f40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8522b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 r5:00001000 r4:eac8f000 r10:61c88647 r9:8522b000 r8:8525e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:85257c80 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:389 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257500 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8522bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ffb8c r4:851ff800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ffb8c r4:8525e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522bc00 r8:8525e2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e280 r8:8027ed34 r7:eac89e60 r6:85256900 r5:8522bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85257dc0 INFO: task kworker/0:389:4168 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ca361000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8522d400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8522d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacab000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fff8c r4:851ffc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fff8c r4:8525e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522d400 r8:8525e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e300 r8:8027ed34 r7:eac89e60 r6:85256980 r5:8522d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85251580 INFO: task kworker/0:390:4170 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800d0113 ffffffff r4:00000000 r5:00001000 r4:eca19000 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Not tainted 6.16.0-rc3-syzkaller #0 r4:8522e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257f00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8522e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520038c r4:85200000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520038c r4:8525e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522e000 r8:8525e3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e380 r8:8027ed34 r7:eac89e60 r6:85256a00 r5:8522e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eacd1d84 r8:00000002 r7:60000113 r6:eacd1d8c r5:85230000 r4:85230000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85230000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526f040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85230000 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520078c r4:85200400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520078c r4:8525e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230000 r8:8525e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e400 r8:8027ed34 r7:eac89e60 r6:85256a80 r5:85230000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85251980 INFO: task kworker/0:392:4174 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8525e480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e480 r8:8027ed34 r7:eac89e60 r6:85256b00 r5:85231800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526f080 INFO: task kworker/0:393:4176 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cad6f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 800d0113 ffffffff [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4180 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead0dd84 r8:00000002 r7:60000113 r6:ead0dd8c r5:85232400 r4:85232400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85232400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526f280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85232400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8520138c r4:85201000 r10:00000000 r9:8525e580 r8:8027ed34 r7:eac89e60 r6:85256c00 r5:85232400 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Exception stack(0xdffd5fb0 to 0xdffd5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4182 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:85233000 r4:85233000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85233000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:8520178c r4:85201400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8526f340 r4:00000000 r5:800d0113 r4:80239bd0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 task:kworker/0:397 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e680 r8:8027ed34 r7:eac89e60 r6:85256d00 r5:85233c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526f580 INFO: task kworker/0:397:4185 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cb700000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8526f580 INFO: task kworker/0:398:4186 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cb700000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:4189 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9f1d84 r8:00000002 r7:60000013 r6:ea9f1d8c r5:85235400 r4:85235400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85235400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8525e780 r8:8027ed34 r7:eac89e60 r6:85256e00 r5:85235400 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cbd99000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:8520338c r4:85203000 r10:00000000 r9:8525e800 r8:8027ed34 r7:ea9f1e60 r6:8525e880 r5:84808c00 Workqueue: events bpf_prog_free_deferred r4:82abe1e4 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:4192 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:8480b000 r4:8480b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526fc80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85202b8c r4:85202800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85202b8c r4:8525e900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480b000 r8:8525e92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8525e900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525e900 r8:8027ed34 r7:eac39e60 r6:8525e980 r5:8480b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526f940 INFO: task kworker/0:401:4192 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4195 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9fdd84 r8:00000002 r7:60000013 r6:ea9fdd8c r5:8480bc00 r4:8480bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526fe40 r5:85202f8c r4:85202c00 r10:00000000 r9:8525ea00 r8:8027ed34 r7:eac39e60 r6:8525ea80 r5:8480bc00 Workqueue: events bpf_prog_free_deferred 5d60: 800d0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:829185c4 r9:eaa31d84 r8:00000002 r7:60000113 r6:eaa31d8c r5:8480e000 r9:83018205 r8:8480e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r10:00000000 r9:85256e80 r8:8027ed34 r7:eab85e60 r6:8525eb00 r5:8480e000 r4:00000000 r4:dffd5dc0 r5:00001000 r4:eca19000 r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:4200 blocked for more than 464 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa0dd84 r8:00000002 r7:60000113 r6:eaa0dd8c r5:85236000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:848d0240 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa05d84 r8:00000002 r7:60000113 r6:eaa05d8c r5:85236c00 r4:85236c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85236c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852844c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0601000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85203b8c r4:85203800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85203b8c r4:8525eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236c00 r8:8525ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:8525eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525eb80 r8:8027ed34 r7:eac39e60 r6:85289000 r5:85236c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa05fb0 to 0xeaa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:4204 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa3dd84 r8:00000002 r7:60000013 r6:eaa3dd8c r5:85219800 r5:85219800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284340 r5:8520378c r4:85203400 r10:00000000 r9:8525ec00 r8:8027ed34 r7:eaa05e60 r6:85289080 r5:85219800 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffd5fb0 to 0xdffd5ff8) Not tainted 6.16.0-rc3-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa55d84 r8:00000002 r7:60000013 r6:eaa55d8c r5:85238000 r4:85238000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85238000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85238000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85203f8c r4:85203c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85203f8c r4:8525ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85238000 r8:8525ecac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8525ec80 r8:8027ed34 r7:eaa05e60 r6:85289100 r5:85238000 Workqueue: events bpf_prog_free_deferred r4:82abe1e4 r4:00000000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:85239800 r4:85239800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85239800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284a40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85239800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0715000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85204b8c r4:85204800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85204b8c r4:8525ed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85239800 r8:8525ed2c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdffd5d20 to 0xdffd5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852846c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520438c r4:85204000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520438c r4:8525ed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85238c00 r8:8525edac r7:82804d40 r6:dddced40 r5:dddced60 r4:8525ed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ed80 r8:8027ed34 r7:eaa65e60 r6:85289200 r5:85238c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85284540 INFO: task kworker/0:407:4210 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cd907000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:829185c4 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:8523b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85284540 INFO: task kworker/0:408:4211 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cda80000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r5:00001000 r4:e0785000 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286000 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8523c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa89000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529178c r4:85291400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529178c r4:85289380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523c800 r8:852893ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85289380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85289380 r8:8027ed34 r7:eaa31e60 r6:85289400 r5:8523c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa9dfb0 to 0xeaa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85286540 INFO: task kworker/1:147:4215 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r5:800d0113 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:829185c4 r9:eaaa9d84 r8:00000002 r7:60000013 r6:eaaa9d8c r5:8523d400 r4:8523d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284bc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8523d400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0769000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85204f8c r4:85204c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85204f8c r4:8525ef00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523d400 r8:8525ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8525ef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ef00 r8:8027ed34 r7:eaa25e60 r6:85289480 r5:8523d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852849c0 INFO: task kworker/0:410:4217 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ce85f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4220 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4220 tgid:4220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:8523e000 r4:8523e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284e00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:e4873000 r5:8520578c r4:85205400 r10:61c88647 r9:8523e000 r8:8525efac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8525ef80 r8:8027ed34 r7:eaa25e60 r6:85289500 r5:8523e000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85284980 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:4222 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:4222 tgid:4222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:8523a400 r4:8523a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284b00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8523a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88bd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85205f8c r4:85205c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85205f8c r4:85288000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523a400 r8:8528802c r7:82804d40 r6:dddced40 r5:dddced60 r4:85288000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288000 r8:8027ed34 r7:eaac5e60 r6:85289580 r5:8523a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85284c00 INFO: task kworker/0:412:4222 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cf0ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:4225 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:85240c00 r4:85240c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85240c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8897000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85240c00 r8:852880ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288080 r8:8027ed34 r7:eaae1e60 r6:85289600 r5:85240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85284d40 INFO: task kworker/0:413:4225 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cf2f9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4226 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab19d84 r8:00000002 r7:60000013 r6:eab19d8c r5:85241800 r4:85241800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85241800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85241800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea95d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520638c r4:85206000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520638c r4:85288100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85241800 r8:8528812c r7:82804d40 r6:dddced40 r5:dddced60 r4:85288100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288100 r8:8027ed34 r7:eaae1e60 r6:85289680 r5:85241800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d080 INFO: task kworker/0:414:4226 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cf633000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:4228 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:85243000 r4:85243000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85243000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85243000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa09000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520738c r4:85207000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520738c r4:85288180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85243000 r8:852881ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288180 r8:8027ed34 r7:eab19e60 r6:85289700 r5:85243000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d080 INFO: task kworker/0:415:4228 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cfd70000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85240000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea981000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520678c r4:85206400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520678c r4:85288200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85240000 r8:8528822c r7:82804d40 r6:dddced40 r5:dddced60 r4:85288200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288200 r8:8027ed34 r7:eab39e60 r6:85289780 r5:85240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d080 INFO: task kworker/0:416:4229 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:4231 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:8480ec00 r4:8480ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d480 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea991000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85206b8c r4:85206800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85206b8c r4:85288280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480ec00 r8:852882ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288280 r8:8027ed34 r7:eab39e60 r6:85288300 r5:8480ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa6dfb0 to 0xeaa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d1c0 INFO: task kworker/0:417:4231 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 5d60: 800d0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8587db8c r4:8587d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:4234 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:4234 tgid:4234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead39d84 r8:00000002 r7:60000013 r6:ead39d8c r5:8480d400 r4:8480d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead39e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d600 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480d400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85206f8c r4:85206c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85206f8c r4:85288380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480d400 r8:852883ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288380 r8:8027ed34 r7:eab39e60 r6:85288400 r5:8480d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead39fb0 to 0xead39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d300 INFO: task kworker/0:418:4234 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d02d8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4237 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead3dd84 r8:00000002 r7:60000013 r6:ead3dd8c r5:8480c800 r4:8480c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284d40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521038c r4:85210000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521038c r4:85288480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480c800 r8:852884ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288480 r8:8027ed34 r7:eab39e60 r6:85288500 r5:8480c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d580 INFO: task kworker/0:419:4237 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d0521000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:420:4238 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead45d84 r8:00000002 r7:60000013 r6:ead45d8c r5:8480a400 r4:8480a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480a400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa39000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520778c r4:85207400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520778c r4:85288580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480a400 r8:852885ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288580 r8:8027ed34 r7:ead3de60 r6:85288600 r5:8480a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d680 INFO: task kworker/0:420:4238 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d07eb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:4239 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead61d84 r8:00000002 r7:60000013 r6:ead61d8c r5:84833000 r4:84833000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84833000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528da00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa69000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85207b8c r4:85207800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85207b8c r4:85288680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:852886ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288680 r8:8027ed34 r7:ead3de60 r6:85288700 r5:84833000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d680 INFO: task kworker/0:421:4239 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d0d21000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:148:4242 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:148 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead69d84 r8:00000002 r7:60000013 r6:ead69d8c r5:84809800 r4:84809800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84809800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84809800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0591000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85292f8c r4:85292c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85292f8c r4:85289800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84809800 r8:8528982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85289800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 r5:00001000 r4:eca19000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:149:4244 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:149 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:84828c00 r4:84828c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84828c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286f40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84828c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4246 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead6dd84 r8:00000002 r7:60000113 r6:ead6dd8c r5:84829800 r4:84829800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84829800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de180 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84829800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab09000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85210b8c r4:85210800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85210b8c r4:85288880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84829800 r8:852888ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288880 r8:8027ed34 r7:ead3de60 r6:85288900 r5:84829800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead6dfb0 to 0xead6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528df80 INFO: task kworker/0:422:4246 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d1734000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:4247 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa49d84 r8:00000002 r7:60000013 r6:eaa49d8c r5:8482a400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:eaac9000 r5:8521078c r4:85210400 r7:dddced40 r6:83018000 r5:8521078c r4:85288980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4249 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:8482b000 r4:8482b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de500 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8482b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead29000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85210f8c r4:85210c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85210f8c r4:85288a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482b000 r8:85288aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288a80 r8:8027ed34 r7:ead6de60 r6:85288b00 r5:8482b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead65fb0 to 0xead65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852de000 INFO: task kworker/0:424:4249 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d1924000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:4252 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead95d84 r8:00000002 r7:60000013 r6:ead95d8c r5:8482d400 r4:8482d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de6c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8482d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521138c r4:85211000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521138c r4:85288b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:85288bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288b80 r8:8027ed34 r7:ead65e60 r6:85288c00 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852de440 INFO: task kworker/0:425:4252 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d1f56000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:4255 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead89d84 r8:00000002 r7:60000113 r6:ead89d8c r5:8482bc00 r4:8482bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de7c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8482bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521178c r4:85211400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521178c r4:85288c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482bc00 r8:85288cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288c80 r8:8027ed34 r7:ead95e60 r6:85288d00 r5:8482bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead89fb0 to 0xead89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852de440 INFO: task kworker/0:426:4255 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d25e1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:4257 blocked for more than 465 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:4257 tgid:4257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadb5d84 r8:00000002 r7:60000013 r6:eadb5d8c r5:8482e000 r4:8482e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de980 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8482e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85211b8c r4:85211800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85211b8c r4:85288d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482e000 r8:85288dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288d80 r8:8027ed34 r7:ead89e60 r6:85288e00 r5:8482e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb5fb0 to 0xeadb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852de5c0 INFO: task kworker/0:427:4257 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d2949000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:4259 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd1d84 r8:00000002 r7:60000113 r6:eadd1d8c r5:8482ec00 r4:8482ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dec80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8482ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521238c r4:85212000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521238c r4:85288e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:85288eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288e80 r8:8027ed34 r7:eadb5e60 r6:85288f00 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852de800 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:4260 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead75d84 r8:00000002 r7:60000113 r6:ead75d8c r5:8482c800 r4:8482c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852deb00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85211f8c r4:85211c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85211f8c r4:85288f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:85288fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85288f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85288f80 r8:8027ed34 r7:eadd1e60 r6:852d4000 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852deac0 INFO: task kworker/0:429:4260 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d2fa3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4263 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:84828000 r4:84828000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84828000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852defc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84828000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85212b8c r4:85212800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85212b8c r4:852d4080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84828000 r8:852d40ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4080 r8:8027ed34 r7:eadd1e60 r6:852d4100 r5:84828000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852de880 INFO: task kworker/0:430:4263 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d31bd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4265 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:84835400 r4:84835400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84835400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dee40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84835400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521278c r4:85212400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521278c r4:852d4180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84835400 r8:852d41ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4180 r8:8027ed34 r7:eadd9e60 r6:852d4200 r5:84835400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852de880 INFO: task kworker/0:431:4265 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d3556000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:4266 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:4266 tgid:4266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:84878000 r4:84878000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84878000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dde00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84878000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529238c r4:85292000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529238c r4:85289900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84878000 r8:8528992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85289900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85289900 r8:8027ed34 r7:ead69e60 r6:852d4280 r5:84878000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade5fb0 to 0xeade5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852dd380 INFO: task kworker/1:150:4266 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d3863000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4269 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:84878c00 r4:84878c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84878c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae15000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521338c r4:85213000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521338c r4:852d4300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84878c00 r8:852d432c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4300 r8:8027ed34 r7:eadd9e60 r6:852d4380 r5:84878c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85286a40 INFO: task kworker/0:432:4269 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d3863000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:4270 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae0dd84 r8:00000002 r7:60000013 r6:eae0dd8c r5:84879800 r4:84879800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84879800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84879800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae05000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85212f8c r4:85212c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85212f8c r4:852d4400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84879800 r8:852d442c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4400 r8:8027ed34 r7:eadfde60 r6:852d4480 r5:84879800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e3040 INFO: task kworker/0:433:4270 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d3bda000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 INFO: task kworker/0:434:4272 blocked for more than 466 seconds. [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8487a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85213f8c r4:85213c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85213f8c r4:852d4500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487a400 r8:852d452c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4500 r8:8027ed34 r7:eadfde60 r6:852d4580 r5:8487a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e3040 INFO: task kworker/0:434:4272 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d3fc6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:435:4273 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r5:8487b000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3380 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8487b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae21000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521378c r4:85213400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521378c r4:852d4600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:852d462c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4600 r8:8027ed34 r7:eae19e60 r6:852d4680 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e32c0 INFO: task kworker/0:435:4273 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d42b5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4277 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8487bc00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85213b8c r4:85213800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85213b8c r4:852d4700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487bc00 r8:852d472c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4700 r8:8027ed34 r7:eae19e60 r6:852d4780 r5:8487bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e3300 INFO: task kworker/0:436:4277 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d42b5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:4278 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:8487c800 r4:8487c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8487c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3a40 r4:00000000 r5:00001000 r4:eae55000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8530c78c r4:852d4800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487c800 r8:852d482c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4800 r8:8027ed34 r7:eae19e60 r6:852d4880 r5:8487c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae3dfb0 to 0xeae3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e34c0 INFO: task kworker/0:437:4278 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d47ea000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4279 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:8487d400 r4:8487d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8487d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e34c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8487d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae45000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530c38c r4:8530c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530c38c r4:852d4900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487d400 r8:852d492c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4900 r8:8027ed34 r7:eae3de60 r6:852d4980 r5:8487d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e34c0 INFO: task kworker/0:438:4279 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d4c86000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:8487e000 r4:8487e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8487e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3e80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8487e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae79000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530d38c r4:8530d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530d38c r4:852d4a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487e000 r8:852d4a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4a00 r8:8027ed34 r7:eae3de60 r6:852d4a80 r5:8487e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e3900 INFO: task kworker/0:439:4282 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d4c86000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:440 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3b80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8487ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae61000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530cb8c r4:8530c800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530cb8c r4:852d4b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487ec00 r8:852d4b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4b00 r8:8027ed34 r7:eae49e60 r6:852d4b80 r5:8487ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae65fb0 to 0xeae65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e3ac0 INFO: task kworker/0:440:4284 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d53ef000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:82abe1e4 r4:00000000 r5:00001000 r4:eca19000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84560000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3d40 r7:dddced40 r6:83018000 r5:8530cf8c r4:852d4c00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d53ef000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:4288 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae59d84 r8:00000002 r7:60000013 r6:eae59d8c r5:84561800 r4:84561800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84561800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5480 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84561800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530df8c r4:8530dc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530df8c r4:852d4d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84561800 r8:852d4d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4d00 r8:8027ed34 r7:eae49e60 r6:852d4d80 r5:84561800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:852e3c80 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:8587db8c r4:8587d800 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4289 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:84560c00 r4:84560c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84560c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f51c0 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeabc5fb0 to 0xeabc5ff8) r4:852e3dc0 Workqueue: events bpf_prog_free_deferred 5d60: 800d0113 ffffffff r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:4293 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:84563000 r4:84563000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84563000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84563000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb39000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530db8c r4:8530d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530db8c r4:852d4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84563000 r8:852d4f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852d4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d4f00 r8:8027ed34 r7:eae59e60 r6:852d4f80 r5:84563000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:82abe1e4 r4:00000000 r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:4296 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:4296 tgid:4296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae7dd84 r8:00000002 r7:60000013 r6:eae7dd8c r5:84563c00 r4:84563c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84563c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dff29000 r10:61c88647 r9:84563c00 r8:852f302c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:4297 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:4297 tgid:4297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:84564800 r4:84564800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84564800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84565400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84565400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e000d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530e78c r4:8530e400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530e78c r4:852f3180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84565400 r8:852f31ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3180 r8:8027ed34 r7:eae7de60 r6:852f3200 r5:84565400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852f5440 INFO: task kworker/0:446:4300 is blocked on a mutex likely owned by task kworker/0:129:3505. r4:00000000 r4:82abe1e4 r4:00000000 r5:8587db8c r4:8587d800 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 INFO: task kworker/0:447:4301 blocked for more than 466 seconds. [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe9d84 r8:00000002 r7:60000013 r6:eabe9d8c r5:84566000 r4:84566000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84566000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f59c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84566000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0093000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530eb8c r4:8530e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530eb8c r4:852f3280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84566000 r8:852f32ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3280 r8:8027ed34 r7:eabd5e60 r6:852f3300 r5:84566000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:84b48100 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5ac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85245400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530ef8c r4:8530ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530ef8c r4:852f3380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85245400 r8:852f33ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3380 r8:8027ed34 r7:eabe9e60 r6:85289a00 r5:85245400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852f5a00 INFO: task kworker/0:448:4304 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d69ad000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:152 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305200 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0531000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85292b8c r4:85292800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85292b8c r4:85289a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85243c00 r8:85289aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85289a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85289a80 r8:8027ed34 r7:ead69e60 r6:85289b00 r5:85243c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852dd440 INFO: task kworker/1:152:4306 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d69ad000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8587db8c r4:8587d800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4307 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4307 tgid:4307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac09d84 r8:00000002 r7:60000013 r6:eac09d8c r5:85242400 r4:85242400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85242400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85242400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea931000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:852f3400 r8:8027ed34 r7:eabf5e60 r6:85289b80 r5:85242400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: d72ac000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4308 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:85246c00 r4:85246c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85246c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:852f3480 r8:8027ed34 r7:eac09e60 r6:85289c00 r5:85246c00 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d76d9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8587db8c r4:8587d800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:451 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530f78c r4:8530f400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530f78c r4:852f3500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85244800 r8:852f352c r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3500 r8:8027ed34 r7:eac09e60 r6:85289c80 r5:85244800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852f5a40 INFO: task kworker/0:451:4310 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d76d9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b4a480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ddf00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85246000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530fb8c r4:8530f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530fb8c r4:852f3580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85246000 r8:852f35ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3580 r8:8027ed34 r7:eac09e60 r6:85289d00 r5:85246000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac35fb0 to 0xeac35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852f5d80 INFO: task kworker/0:452:4311 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d7c1b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/1:153:4314 blocked for more than 466 seconds. r4:8522ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85308ac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8522ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842f3b8c r4:842f3800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842f3b8c r4:85289d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522ec00 r8:85289dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85289d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85289d80 r8:8027ed34 r7:ead69e60 r6:85289e00 r5:8522ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305100 INFO: task kworker/1:153:4314 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d7c1b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:154 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e05ed000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529338c r4:85293000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529338c r4:85289e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523ec00 r8:85289eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85289e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85289e80 r8:8027ed34 r7:eabfde60 r6:85289f00 r5:8523ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305100 INFO: task kworker/1:154:4316 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d7f79000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b4a480 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 r10:829185c4 r9:eac41d84 r8:00000002 r7:60000113 r6:eac41d8c r5:85248000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85248000 r8:85289fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305380 INFO: task kworker/1:155:4318 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d8570000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4320 blocked for more than 466 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829185c4 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:85248c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4857000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530ff8c r4:8530fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530ff8c r4:852f3600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248c00 r8:852f362c r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3600 r8:8027ed34 r7:eac09e60 r6:852ff080 r5:85248c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fd080 INFO: task kworker/0:453:4320 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d883e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:454 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531878c r4:85318400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531878c r4:852f3680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524a400 r8:852f36ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3680 r8:8027ed34 r7:eac09e60 r6:852ff100 r5:8524a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fd280 INFO: task kworker/0:454:4324 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d8b74000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:4326 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac7dd84 r8:00000002 r7:60000113 r6:eac7dd8c r5:8524bc00 r4:8524bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8524bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8524bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531938c r4:85319000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8531938c r4:852ff180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) r4:82abe1e4 r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85318b8c r4:852f3700 Exception stack(0xeac99fb0 to 0xeac99ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4a480 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:4329 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:85249800 r4:85249800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85249800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85249800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531af8c r4:8531ac00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531af8c r4:852f3780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85249800 r8:852f37ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3780 r8:8027ed34 r7:eac99e60 r6:852ff300 r5:85249800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fd3c0 INFO: task kworker/0:456:4329 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d92f2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:457 state:D stack:0 pid:4330 tgid:4330 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8524e000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85318f8c r4:85318c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85318f8c r4:852f3800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524e000 r8:852f382c r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3800 r8:8027ed34 r7:eaca5e60 r6:852ff380 r5:8524e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb1fb0 to 0xeacb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fd3c0 INFO: task kworker/0:457:4330 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d9575000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:157 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eac21000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85293b8c r4:85293800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85293b8c r4:852ff400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524ec00 r8:852ff42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ff400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ff400 r8:8027ed34 r7:eabfde60 r6:852ff480 r5:8524ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf1fb0 to 0xeacf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305cc0 INFO: task kworker/1:157:4333 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d9637000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:4335 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead01d84 r8:00000002 r7:60000013 r6:ead01d8c r5:8524b000 r4:8524b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8524b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fda80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8524b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531978c r4:85319400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531978c r4:852f3880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524b000 r8:852f38ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3880 r8:8027ed34 r7:eaca5e60 r6:852ff500 r5:8524b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fd900 INFO: task kworker/0:458:4335 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:459:4336 blocked for more than 467 seconds. r4:84a38000 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdb80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a38000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac31000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85319b8c r4:85319800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85319b8c r4:852f3900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38000 r8:852f392c r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3900 r8:8027ed34 r7:eaca5e60 r6:852ff580 r5:84a38000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fd900 INFO: task kworker/0:459:4336 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d9f48000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:4339 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdd00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac51000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85319f8c r4:85319c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85319f8c r4:852f3980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38c00 r8:852f39ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3980 r8:8027ed34 r7:eaca5e60 r6:852ff600 r5:84a38c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead21fb0 to 0xead21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fdac0 INFO: task kworker/0:460:4339 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xdffd5d20 to 0xdffd5d68) r4:dffd5dc0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:158 state:D stack:0 pid:4340 tgid:4340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae89d84 r8:00000002 r7:60000113 r6:eae89d8c r5:84a3a400 r4:84a3a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85308a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85293f8c r4:852ff680 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:461:4342 blocked for more than 467 seconds. r10:829185c4 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:84a39800 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a39800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531a38c r4:8531a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531a38c r4:852f3a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a39800 r8:852f3a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3a00 r8:8027ed34 r7:eaca5e60 r6:852ff780 r5:84a39800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fdb00 INFO: task kworker/0:461:4342 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: da6b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b48100 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:4346 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4346 tgid:4346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaea1d84 r8:00000002 r7:60000013 r6:eaea1d8c r5:84a3bc00 r4:84a3bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd9000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:852f3b00 r8:8027ed34 r7:eaca5e60 r6:852ff880 r5:84a3bc00 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:eca19000 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:4348 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:159 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae9dd84 r8:00000002 r7:60000113 r6:eae9dd8c r5:84a3b000 r4:84a3b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9fc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544938c r4:85449000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8544938c r4:852ff900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3b000 r8:852ff92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ff900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ff900 r8:8027ed34 r7:eabfde60 r6:852ff980 r5:84a3b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae9dfb0 to 0xeae9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85308940 INFO: task kworker/1:159:4348 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:160:4350 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:160 state:D stack:0 pid:4350 tgid:4350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:84a3e000 r4:84a3e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ef280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab35000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:85308940 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:82abe1e4 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:464:4353 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:4353 tgid:4353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaea5d84 r8:00000002 r7:60000113 r6:eaea5d8c r5:84a3ec00 r4:84a3ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead05000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531b38c r4:8531b000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531b38c r4:852f3b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:852f3bac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3b80 r8:8027ed34 r7:eaca5e60 r6:852ffb00 r5:84a3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea5fb0 to 0xeaea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852fd6c0 INFO: task kworker/0:464:4353 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: daf93000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b4a480 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aac1c0 INFO: task kworker/0:465:4356 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: db195000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:4357 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:4357 tgid:4357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaeb9d84 r8:00000002 r7:60000113 r6:eaeb9d8c r5:84a40c00 r4:84a40c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a40c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a40c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead25000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531b78c r4:8531b400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531b78c r4:852f3c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a40c00 r8:852f3cac r7:82804d40 r6:dddced40 r5:dddced60 r4:852f3c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3c80 r8:8027ed34 r7:eaeb5e60 r6:852ffc00 r5:84a40c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac1c0 INFO: task kworker/0:466:4357 is blocked on a mutex likely owned by task kworker/0:129:3505. Workqueue: events bpf_prog_free_deferred 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:4359 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaec9d84 r8:00000002 r7:60000113 r6:eaec9d8c r5:84a42400 r4:84a42400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a42400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aaca80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a42400 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf05000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531cf8c r4:8531cc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac100 INFO: task kworker/0:467:4359 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: db48b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:8587db8c r4:8587d800 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:468 state:D stack:0 pid:4360 tgid:4360 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:eaec1000 r7:dddced40 r6:83018000 r5:8531bf8c r4:852f3d80 r4:852f3d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f3d80 r8:8027ed34 r7:eaec9e60 r6:852ffd00 r5:84a43000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac100 INFO: task kworker/0:468:4360 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: db8fa000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:4363 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:84a41800 r4:84a41800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a41800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:8531c38c r4:8531c000 r4:852f3e00 Exception stack(0xeaee9fb0 to 0xeaee9ff8) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800d0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4364 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4364 tgid:4364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:84a43c00 r4:84a43c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a43c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac840 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a43c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531c78c r4:8531c400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531c78c r4:852f3e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:852f3e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dbc29000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:4366 blocked for more than 467 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a44800 r4:829185c0 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:852f3f00 r8:8027ed34 r7:eaec9e60 r6:852ffe80 r5:84a44800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dbc29000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:4369 blocked for more than 467 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r5:8531d78c r4:8531d400 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac800 INFO: task kworker/0:472:4369 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dbda8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 5fa0: 00000000 00000000 00000000 00000000 r5:84a46000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aacc00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a46000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531d38c r4:8531d000 r7:dddced40 r6:83018000 r5:8531d38c r4:85368000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:474 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfbf9000 r4:85368080 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8524c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531e38c r4:8531e000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531e38c r4:85368100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524c800 r8:8536812c r7:82804d40 r6:dddced40 r5:dddced60 r4:85368100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85368100 r8:8027ed34 r7:eaa19e60 r6:8536d080 r5:8524c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aacd40 INFO: task kworker/0:475:4374 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dc706000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b48100 Workqueue: events bpf_prog_free_deferred [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:477 state:D stack:0 pid:4378 tgid:4378 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84a49800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531fb8c r4:8531f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8531fb8c r4:85368200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a49800 r8:8536822c r7:82804d40 r6:dddced40 r5:dddced60 r4:85368200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85368200 r8:8027ed34 r7:eaa61e60 r6:8536d180 r5:84a49800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305e80 INFO: task kworker/0:477:4378 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dcc91000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000001 INFO: task kworker/0:478:4380 blocked for more than 468 seconds. [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:85368280 r8:8027ed34 r7:eaf21e60 r6:8536d200 r5:84a48c00 Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85308cc0 INFO: task kworker/0:478:4380 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:84a4a400 r8:8536832c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b48100 r4:84a4b000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:85368380 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:800d0113 r4:80239bd0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85368400 r10:00000000 r9:85368400 r8:8027ed34 r7:eaf21e60 r6:8536d380 r5:84a4bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf41fb0 to 0xeaf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85375200 INFO: task kworker/0:481:4386 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd2ab000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:dddced40 r6:83018000 r5:8531f78c r4:85368480 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4391 blocked for more than 468 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf55d84 r8:00000002 r7:60000113 r6:eaf55d8c r5:84a4d400 r4:84a4d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532038c r4:85320000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a4d400 r8:8536852c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375680 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85368580 r8:8027ed34 r7:eaf55e60 r6:85368600 r5:84566c00 r4:853755c0 Call trace: 5d60: 800d0113 ffffffff r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:84562400 r5:00001000 r4:e0783000 r10:00000000 r9:85368680 r8:8027ed34 r7:eaf55e60 r6:85368700 r5:84562400 r4:85375600 INFO: task kworker/0:485:4396 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: de01c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84870000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85368780 r8:8027ed34 r7:eaf51e60 r6:85368800 r5:84870000 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Workqueue: events bpf_prog_free_deferred [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85320f8c r4:85320c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85320f8c r4:85368880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870c00 r8:853688ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85368880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85368880 r8:8027ed34 r7:eaf5de60 r6:85368900 r5:84870c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85375a00 INFO: task kworker/0:487:4398 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: de49a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 task:kworker/0:488 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:8532138c r4:85321000 r10:00000000 r9:85368980 r8:8027ed34 r7:eaea9e60 r6:85368a00 r5:84871800 Workqueue: events bpf_prog_free_deferred 5d20: de600000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:4404 blocked for more than 468 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:84872400 r4:84872400 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ea987000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532178c r4:85321400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532178c r4:85368a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84872400 r8:85368aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85368a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b48100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:4405 blocked for more than 468 seconds. r4:84873000 r4:00000000 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84873000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85321f8c r4:85321c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85321f8c r4:85368b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84873000 r8:85368bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85368b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85368b80 r8:8027ed34 r7:eaf69e60 r6:85368c00 r5:84873000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85375d40 r4:00000000 r4:dffd5dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85321b8c r4:85368c80 task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4a480 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400 Not tainted 6.16.0-rc3-syzkaller #0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:8532278c r4:85322400 Exception stack(0xeaf75fb0 to 0xeaf75ff8) task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: df1ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0 5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 800d0113 ffffffff r5:800d0113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84875400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538c280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa21000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532238c r4:85322000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532238c r4:85368e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84875400 r8:85368eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85368e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85368e80 r8:8027ed34 r7:eaf75e60 r6:85368f00 r5:84875400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8538c180 INFO: task kworker/0:493:4410 is blocked on a mutex likely owned by task kworker/0:129:3505. task:kworker/0:129 state:R running task stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffd5dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:494 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:85322f8c r4:85322c00 Exception stack(0xeaf79fb0 to 0xeaf79ff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00 r4:00000001 INFO: task kworker/0:495:4415 blocked for more than 468 seconds. r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538c780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84876c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa99000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85322b8c r4:85322800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85322b8c r4:85393080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84876c00 r8:853930ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393080 r8:8027ed34 r7:eaf79e60 r6:85393100 r5:84876c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf81fb0 to 0xeaf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8538c800 INFO: task kworker/0:495:4415 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r5:00001000 r4:dfeeb000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85393180 r8:8027ed34 r7:eaf79e60 r6:85393200 r5:849d8000 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 90000013 ffffffff r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:4420 blocked for more than 468 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:849d8c00 r4:849d8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538cbc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532378c r4:85323400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532378c r4:85393280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d8c00 r8:853932ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393280 r8:8027ed34 r7:eaf85e60 r6:85393300 r5:849d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:df911dc0 r4:00000000 r5:84b1eb8c r4:84b1e800 r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375f80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead77000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85323f8c r4:85323c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85323f8c r4:85393380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d9800 r8:853933ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393380 r8:8027ed34 r7:eaf89e60 r6:85393400 r5:849d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8538c9c0 INFO: task kworker/0:498:4421 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 Exception stack(0xdf911d20 to 0xdf911d68) r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 Exception stack(0xdf911fb0 to 0xdf911ff8) Not tainted 6.16.0-rc3-syzkaller #0 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538cfc0 r7:dddced40 r6:83018000 r5:85323b8c r4:85393480 Exception stack(0xeaf7dfb0 to 0xeaf7dff8) task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:4427 blocked for more than 468 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:849db000 r4:849db000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849db000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849db000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532c38c r4:8532c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532c38c r4:85393580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849db000 r8:853935ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393580 r8:8027ed34 r7:eaf8de60 r6:85393600 r5:849db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:4429 blocked for more than 468 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:84a3d400 r4:84a3d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b90c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae81000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532f38c r4:8532f000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8532f38c r4:8536d500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3d400 r8:8536d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:8536d500 r8:8027ed34 r7:eae9de60 r6:8536d580 r5:84a3d400 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:df911dc0 r4:00000000 r5:00001000 r4:dfeeb000 r4:833b4e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ab0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532cf8c r4:8532cc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532cf8c r4:85393680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab0000 r8:853936ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393680 r8:8027ed34 r7:eaf99e60 r6:8536d600 r5:84ab0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d8180 INFO: task kworker/0:501:4430 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r4:833b5d80 task:kworker/0:502 state:D stack:0 pid:4431 tgid:4431 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eadbb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532c78c r4:8532c400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532c78c r4:85393700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab0c00 r8:8539372c r7:82804d40 r6:dddced40 r5:dddced60 r4:85393700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393700 r8:8027ed34 r7:eafa5e60 r6:8536d680 r5:84ab0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d8180 INFO: task kworker/0:502:4431 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r5:00001000 r4:dfeeb000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8532cb8c r4:8532c800 r4:85393780 Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d8240 INFO: task kworker/0:503:4433 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4436 blocked for more than 468 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8532d78c r4:8532d400 r10:00000000 r9:85393880 r8:8027ed34 r7:eafa5e60 r6:85393900 r5:849dd400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdf911d20 to 0xdf911d68) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdf911fb0 to 0xdf911ff8) INFO: task kworker/0:505:4437 blocked for more than 468 seconds. r10:829185c4 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:849de000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849de000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8740 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532d38c r4:8532d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532d38c r4:85393980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849de000 r8:853939ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393980 r8:8027ed34 r7:eafade60 r6:85393a00 r5:849de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d60: 90000013 ffffffff r4:df911dc0 r5:00001000 r4:dfeeb000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:833b5d80 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8d40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532e38c r4:8532e000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532e38c r4:85393a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849dec00 r8:85393aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393a80 r8:8027ed34 r7:eafade60 r6:85393b00 r5:849dec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb9fb0 to 0xeafb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d8780 INFO: task kworker/0:506:4440 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 r4:df911dc0 r5:00001000 r4:dfeeb000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:507:4441 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:849dbc00 r4:849dbc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849dbc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85393b80 1fa0: 00000000 00000000 00000000 00000000 1d60: 90000013 ffffffff [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:4444 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:84ab3000 r4:84ab3000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab3000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:833b4e00 1fa0: 00000000 00000000 00000000 00000000 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4446 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:84ab1800 r4:84ab1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9f40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ab1800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533578c r4:85335400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8533578c r4:85393d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab1800 r8:85393d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85393d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85393d00 r8:8027ed34 r7:eafb9e60 r6:8536d780 r5:84ab1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd9fb0 to 0xeafd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d8bc0 INFO: task kworker/0:509:4446 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:510:4447 blocked for more than 469 seconds. r10:829185c4 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:84ab3c00 r4:00000000 r9:83018005 r8:84ab3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 r10:61c88647 r9:84ab3c00 r8:85393dac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:4449 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafe5d84 r8:00000002 r7:60000013 r6:eafe5d8c r5:84ab2400 r4:84ab2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85393e00 r8:8027ed34 r7:eafd9e60 r6:8536d880 r5:84ab2400 r4:848d8d00 Workqueue: events bpf_prog_free_deferred 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:4451 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:84ab4800 r4:84ab4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae73000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532ef8c r4:8532ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532ef8c r4:85393e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab4800 r8:85393eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85393e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeafedfb0 to 0xeafedff8) task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:df911dc0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4453 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8532f78c r4:8532f400 r4:85393f00 r10:00000000 r9:85393f00 r8:8027ed34 r7:eafd9e60 r6:85393f80 r5:84848000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b9000 INFO: task kworker/0:513:4453 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.16.0-rc3-syzkaller #0 r4:84848c00 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8532fb8c r4:84968000 r10:00000000 r9:84968000 r8:8027ed34 r7:eafd9e60 r6:84968080 r5:84848c00 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4459 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4459 tgid:4459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:84849800 r4:84849800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84849800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84849800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532ff8c r4:8532fc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532ff8c r4:84968100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84849800 r8:8496812c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968100 r8:8027ed34 r7:eafd9e60 r6:84968180 r5:84849800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b93c0 INFO: task kworker/0:515:4459 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:4460 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:8484a400 r4:8484a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b96c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8484a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb011000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533438c r4:85334000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8533438c r4:84968200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484a400 r8:8496822c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968200 r8:8027ed34 r7:eafd9e60 r6:84968280 r5:8484a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b93c0 INFO: task kworker/0:516:4460 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:4462 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:8484b000 r4:8484b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9980 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8484b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533478c r4:85334400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8533478c r4:84968300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484b000 r8:8496832c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968300 r8:8027ed34 r7:eafd9e60 r6:84968380 r5:8484b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b9540 INFO: task kworker/0:517:4462 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:848b9800 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:833b5d80 task:kworker/0:519 state:D stack:0 pid:4466 tgid:4466 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9c00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8484c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85334f8c r4:85334c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85334f8c r4:84968500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484c800 r8:8496852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968500 r8:8027ed34 r7:eafd9e60 r6:84968580 r5:8484c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b9b40 INFO: task kworker/0:519:4466 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df911dc0 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:8484e000 r4:8484e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8484e000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85336b8c r4:85336800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85336b8c r4:84968700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484e000 r8:8496872c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968700 r8:8027ed34 r7:eafd9e60 r6:84968780 r5:8484e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b9d40 INFO: task kworker/0:521:4471 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:4472 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaee5d84 r8:00000002 r7:60000013 r6:eaee5d8c r5:8484ec00 r4:8484ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8f80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8484ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb53000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85335b8c r4:85335800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85335b8c r4:84968800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484ec00 r8:8496882c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968800 r8:8027ed34 r7:eaed1e60 r6:84968880 r5:8484ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b9f00 INFO: task kworker/0:522:4472 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 r10:829185c4 r9:eaed9d84 r8:00000002 r7:60000113 r6:eaed9d8c r5:849d0000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849d0000 r8:8496892c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968900 r8:8027ed34 r7:eaed1e60 r6:84968980 r5:849d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed9fb0 to 0xeaed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b9f00 INFO: task kworker/0:523:4474 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4477 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:849d0c00 r4:849d0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff49000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533638c r4:85336000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8533638c r4:84968a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d0c00 r8:84968a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a93080 INFO: task kworker/0:524:4477 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdf911fb0 to 0xdf911ff8) INFO: task kworker/0:525:4479 blocked for more than 469 seconds. r5:849d1800 r4:829185c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a93340 INFO: task kworker/0:525:4479 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:4481 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:849d2400 r4:849d2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f2000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85336f8c r4:85336c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85336f8c r4:84968c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d2400 r8:84968c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968c00 r8:8027ed34 r7:eaed1e60 r6:84968c80 r5:849d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a93380 INFO: task kworker/0:526:4481 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:4483 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb041d84 r8:00000002 r7:60000013 r6:eb041d8c r5:849d3000 r4:849d3000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d3000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93880 r5:00001000 r4:e04e1000 r5:8533738c r4:85337000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 1d60: 90000013 ffffffff [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:833b4e00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:4485 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:849d4800 r4:849d4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a939c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533778c r4:85337400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8533778c r4:84968e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d4800 r8:84968e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968e00 r8:8027ed34 r7:eb041e60 r6:84968e80 r5:849d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a93680 INFO: task kworker/0:528:4485 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4486 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:84ab6000 r5:84ab6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93e80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4859000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85337f8c r4:85337c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85337f8c r4:84968f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab6000 r8:84968f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968f00 r8:8027ed34 r7:eaf09e60 r6:8536d980 r5:84ab6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a93840 INFO: task kworker/0:529:4486 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:4490 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:84ab6c00 r4:84ab6c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab6c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa4340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84ab6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ea000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85337b8c r4:85337800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85337b8c r4:8536da00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab6c00 r8:8536da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8536da00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536da00 r8:8027ed34 r7:eae9de60 r6:8536da80 r5:84ab6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa4300 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdf911d20 to 0xdf911d68) 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:163:4491 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:163 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:84ab5400 r4:84ab5400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab5400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa4d00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c838c r4:852c8000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c838c r4:8536db00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab5400 r8:8536db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8536db00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536db00 r8:8027ed34 r7:eae9de60 r6:8536db80 r5:84ab5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4493 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:84a4e000 r4:84a4e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93b00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea959000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534078c r4:85340400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534078c r4:84968f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4e000 r8:84968fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84968f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968f80 r8:8027ed34 r7:eb04de60 r6:8536dc00 r5:84a4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a93d00 INFO: task kworker/0:530:4493 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 90000013 ffffffff r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ac0000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93fc0 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a93e40 INFO: task kworker/0:531:4495 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:84ac1800 r4:829185c0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ef80 dfa0: 00000000 00000000 00000000 00000000 1d60: 90000013 ffffffff [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84aa1100 r8:8027ed34 r7:eb06de60 r6:8536dd80 r5:84ac0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8536ea40 INFO: task kworker/0:533:4499 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r5:00001000 r4:dfeeb000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) INFO: task kworker/0:534:4500 blocked for more than 469 seconds. r5:849d3c00 r4:829185c0 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:84aa1180 INFO: task kworker/0:534:4500 is blocked on a mutex likely owned by task kworker/1:1:43. r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84ac2400 r8:8536de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:165 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa40c0 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4507 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb081d84 r8:00000002 r7:60000013 r6:eb081d8c r5:84ac5400 r4:84ac5400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac5400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a312c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ac5400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534178c r4:85341400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534178c r4:84aa1280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac5400 r8:84aa12ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84a31000 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:4509 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb089d84 r8:00000002 r7:60000113 r6:eb089d8c r5:84ac4800 r4:84ac4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac4800 r8:84aa132c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1300 r8:8027ed34 r7:eb081e60 r6:84a37080 r5:84ac4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 1d60: 90000013 ffffffff r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534278c r4:85342400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534278c r4:84aa1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac6c00 r8:84aa13ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1380 r8:8027ed34 r7:eb089e60 r6:84a37100 r5:84ac6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a31140 INFO: task kworker/0:537:4511 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 1d60: 90000013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:166 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:84ac6000 r4:84ac6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84ac6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae35000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c8f8c r4:852c8c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c8f8c r4:84a37180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac6000 r8:84a371ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a37180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a37180 r8:8027ed34 r7:eae9de60 r6:84a37200 r5:84ac6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa4600 INFO: task kworker/1:166:4513 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:538 state:D stack:0 pid:4514 tgid:4514 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a316c0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534238c r4:85342000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534238c r4:84aa1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3000 r8:84aa142c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1400 r8:8027ed34 r7:eb08de60 r6:84a37280 r5:84ac3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a31600 INFO: task kworker/0:538:4514 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4517 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb095d84 r8:00000002 r7:60000013 r6:eb095d8c r5:84a4ec00 r4:84a4ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31940 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb93000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85342b8c r4:85342800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85342b8c r4:84aa1480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4ec00 r8:84aa14ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1480 r8:8027ed34 r7:eb08de60 r6:84a37300 r5:84a4ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:539:4517 is blocked on a mutex likely owned by task kworker/1:1:43. 1d60: 90000013 ffffffff r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:4519 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:85348000 r4:85348000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85348000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31bc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85348000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534338c r4:85343000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534338c r4:84aa1500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348000 r8:84aa152c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1500 r8:8027ed34 r7:eb095e60 r6:84a37380 r5:85348000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:4521 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaafdd84 r8:00000002 r7:60000013 r6:eaafdd8c r5:85348c00 r4:85348c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85348c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31a80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85348c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc27000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85342f8c r4:85342c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85342f8c r4:84aa1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348c00 r8:84aa15ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1580 r8:8027ed34 r7:eaaf1e60 r6:84a37400 r5:85348c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaafdfb0 to 0xeaafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4524 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4524 tgid:4524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:8534b000 r4:8534b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31cc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8534b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534378c r4:85343400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534378c r4:84aa1600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84aa1600 r8:8027ed34 r7:eaaf1e60 r6:84a37480 r5:8534b000 r4:84a31a40 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4525 blocked for more than 469 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb085d84 r8:00000002 r7:60000013 r6:eb085d8c r5:849d6000 r4:849d6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r5:85343f8c r4:85343c00 r4:84aa1680 5fa0: 00000000 00000000 00000000 00000000 [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:4526 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb07dd84 r8:00000002 r7:60000013 r6:eb07dd8c r5:849d5400 r4:849d5400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d5400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31e00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85343b8c r4:85343800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85343b8c r4:84aa1780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d5400 r8:84aa17ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1780 r8:8027ed34 r7:eb085e60 r6:84aa1800 r5:849d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4529 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf0dd84 r8:00000002 r7:60000013 r6:eaf0dd8c r5:84a28000 r4:84a28000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a28000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d06c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a28000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0661000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534438c r4:85344000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534438c r4:84aa1880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28000 r8:84aa18ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1880 r8:8027ed34 r7:eb085e60 r6:84aa1900 r5:84a28000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d03c0 INFO: task kworker/0:545:4529 is blocked on a mutex likely owned by task kworker/1:1:43. [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:4530 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:84a28c00 r4:84a28c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a28c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534478c r4:85344400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534478c r4:84aa1980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28c00 r8:84aa19ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1980 r8:8027ed34 r7:eaf0de60 r6:84aa1a00 r5:84a28c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a31f00 INFO: task kworker/0:546:4530 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:4532 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb031d84 r8:00000002 r7:60000013 r6:eb031d8c r5:84a2a400 r4:84a2a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d7c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88fd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8534538c r4:84aa1a80 r4:84aa1a80 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4533 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:84a2b000 r4:84a2b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d5c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0797000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85344b8c r4:85344800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85344b8c r4:84aa1b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2b000 r8:84aa1bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1b80 r8:8027ed34 r7:eb031e60 r6:84aa1c00 r5:84a2b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539d080 INFO: task kworker/0:548:4533 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:4538 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:8534c800 r4:8534c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d6c0 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 90000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:4540 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0add84 r8:00000002 r7:60000113 r6:eb0add8c r5:85349800 r4:85349800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85349800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539dac0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85349800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85345b8c r4:85345800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85345b8c r4:84aa1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85349800 r8:84aa1d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1d00 r8:8027ed34 r7:eb031e60 r6:84a37580 r5:85349800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539d800 INFO: task kworker/0:550:4540 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ea989000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534578c r4:85345400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534578c r4:84aa1d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:84aa1dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1d80 r8:8027ed34 r7:eb0ade60 r6:84aa1e00 r5:84a29800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539d800 INFO: task kworker/0:551:4541 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb0b1d84 r8:00000002 r7:60000113 r6:eb0b1d8c r5:84a2c800 r4:84a2c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539dc00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa15000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85345f8c r4:85345c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85345f8c r4:84aa1e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2c800 r8:84aa1eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1e80 r8:8027ed34 r7:eb0ade60 r6:84aa1f00 r5:84a2c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539d780 INFO: task kworker/0:552:4544 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:4547 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:84a2d400 r4:84a2d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539dd40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534638c r4:85346000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534638c r4:84aa1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2d400 r8:84aa1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:553:4547 is blocked on a mutex likely owned by task kworker/1:1:43. 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:554:4548 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:84a2e000 r4:84a2e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539df00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534678c r4:85346400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534678c r4:853a8080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2e000 r8:853a80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8080 r8:8027ed34 r7:eb0b5e60 r6:853a8100 r5:84a2e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe1fb0 to 0xeafe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539da80 INFO: task kworker/0:554:4548 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:84a2ec00 r4:84a2ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d0c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85346b8c r4:85346800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85346b8c r4:853a8180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2ec00 r8:853a81ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8180 r8:8027ed34 r7:eafe1e60 r6:853a8200 r5:84a2ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r4:833b5d80 task:kworker/0:556 state:D stack:0 pid:4552 tgid:4552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0c1d84 r8:00000002 r7:60000013 r6:eb0c1d8c r5:84a2bc00 r4:84a2bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85346f8c r4:85346c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85346f8c r4:853a8280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2bc00 r8:853a82ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8280 r8:8027ed34 r7:eb0b9e60 r6:853a8300 r5:84a2bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9080 INFO: task kworker/0:556:4552 is blocked on a mutex likely owned by task kworker/1:1:43. [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:4554 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:849d6c00 r4:849d6c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d6c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a94c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849d6c00 r8:853a83ac r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:558 state:D stack:0 pid:4556 tgid:4556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0cdd84 r8:00000002 r7:60000013 r6:eb0cdd8c r5:849f0000 r4:849f0000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f0000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab41000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534738c r4:85347000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534738c r4:853a8480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0000 r8:853a84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8480 r8:8027ed34 r7:eb0c9e60 r6:853a8500 r5:849f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9180 INFO: task kworker/0:558:4556 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:559 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9700 r5:00001000 r4:ead07000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85347b8c r4:85347800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85347b8c r4:853a8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0c00 r8:853a85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8580 r8:8027ed34 r7:eb0c9e60 r6:853a8600 r5:849f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9180 INFO: task kworker/0:559:4558 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:4560 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0d1d84 r8:00000002 r7:60000113 r6:eb0d1d8c r5:849f1800 r4:849f1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544878c r4:85448400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544878c r4:853a8680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f1800 r8:853a86ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8680 r8:8027ed34 r7:eb0bde60 r6:853a8700 r5:849f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9580 INFO: task kworker/0:560:4560 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4562 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:849f2400 r4:849f2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a97c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead23000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85347f8c r4:85347c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85347f8c r4:853a8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f2400 r8:853a87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8780 r8:8027ed34 r7:eb0d1e60 r6:853a8800 r5:849f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a95c0 INFO: task kworker/0:561:4562 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:4563 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:849f3000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:849f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849f3000 r8:853a88ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8880 r8:8027ed34 r7:eb0d1e60 r6:853a8900 r5:849f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a95c0 INFO: task kworker/0:562:4563 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:4566 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:4566 tgid:4566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:849f3c00 r4:849f3c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f3c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9bc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448b8c r4:85448800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85448b8c r4:853a8980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f3c00 r8:853a89ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8980 r8:8027ed34 r7:eb0d1e60 r6:853a8a00 r5:849f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9bc0 INFO: task kworker/0:563:4566 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:4568 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:4568 tgid:4568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:849f4800 r4:849f4800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f4800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9d40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448f8c r4:85448c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85448f8c r4:853a8a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f4800 r8:853a8aac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8a80 r8:8027ed34 r7:eb0e1e60 r6:853a8b00 r5:849f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9d40 INFO: task kworker/0:564:4568 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:4570 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0e9d84 r8:00000002 r7:60000013 r6:eb0e9d8c r5:849f5400 r4:849f5400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f5400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85449b8c r4:85449800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85449b8c r4:853a8b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f5400 r8:853a8bac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8b80 r8:8027ed34 r7:eb0e5e60 r6:853a8c00 r5:849f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9b00 INFO: task kworker/0:565:4570 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:df911dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:4571 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:4571 tgid:4571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:849f6000 r4:849f6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d07c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae03000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544978c r4:85449400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544978c r4:853a8c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f6000 r8:853a8cac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8c80 r8:8027ed34 r7:eb0e9e60 r6:853a8d00 r5:849f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a9b00 INFO: task kworker/0:566:4571 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:4575 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:8534a400 r4:8534a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8534a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae77000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544a38c r4:8544a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544a38c r4:853a8d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534a400 r8:853a8dac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:4576 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:4576 tgid:4576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:8534e000 r4:8534e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r4:00000000 1d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:4578 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:85420000 r4:85420000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85420000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85420000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae67000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85449f8c r4:85449c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85449f8c r4:853a8e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85420000 r8:853a8e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853a8e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a8e00 r8:8027ed34 r7:eb0f9e60 r6:853a8e80 r5:85420000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c0140 INFO: task kworker/0:568:4578 is blocked on a mutex likely owned by task kworker/1:1:43. Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:4579 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:85421800 r4:85421800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85421800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc800 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae93000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c978c r4:852c9400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c978c r4:84a37780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85421800 r8:84a377ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a37780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a37780 r8:8027ed34 r7:eb0f5e60 r6:853a8f00 r5:85421800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853bc3c0 INFO: task kworker/1:168:4579 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 1d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:00000000 r5:00001000 r4:dfeeb000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:4582 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:85422400 r4:85422400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85422400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b500 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85422400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852caf8c r4:852cac00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852caf8c r4:84a37800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85422400 r8:84a3782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a37800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a37800 r8:8027ed34 r7:eb101e60 r6:853a8f80 r5:85422400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853bc500 INFO: task kworker/1:169:4582 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:4583 blocked for more than 470 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:4583 tgid:4583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:85423000 r4:85423000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85423000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0a80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85423000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544ab8c r4:8544a800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544ab8c r4:853b6000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85423000 r8:853b602c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b6000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6000 r8:8027ed34 r7:eb0f9e60 r6:853b6080 r5:85423000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c0580 INFO: task kworker/0:569:4583 is blocked on a mutex likely owned by task kworker/1:1:43. r4:00000000 1d60: 80000013 ffffffff r4:df911dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:4585 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:85423c00 r4:85423c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85423c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0900 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85423c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544a78c r4:8544a400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544a78c r4:853b6100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85423c00 r8:853b612c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b6100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6100 r8:8027ed34 r7:eb105e60 r6:853b6180 r5:85423c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c0440 INFO: task kworker/0:570:4585 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 84417000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:170:4587 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:85424800 r4:85424800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85424800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c9b8c r4:852c9800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c9b8c r4:84a37880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85424800 r8:84a378ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a37880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a37880 r8:8027ed34 r7:eb0fde60 r6:853b6280 r5:85424800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853bc5c0 INFO: task kworker/1:170:4587 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 848bc000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:4589 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8534ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0c80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8534ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:853c07c0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:833b4e00 r4:833b5d80 r4:8534bc00 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e485b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ca78c r4:852ca400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852ca78c r4:84a37980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534bc00 r8:84a379ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a37980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a37980 r8:8027ed34 r7:eb0fde60 r6:84a37a00 r5:8534bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853bc940 INFO: task kworker/1:171:4592 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 84ce9000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdf911fb0 to 0xdf911ff8) INFO: task kworker/0:572:4594 blocked for more than 471 seconds. r5:84ab8000 r4:829185c0 r4:00000000 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b38c r4:8544b000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544b38c r4:853b6300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:853b632c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b6300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6300 r8:8027ed34 r7:eb131e60 r6:84a37a80 r5:84ab8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c0cc0 INFO: task kworker/0:572:4594 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) r4:82abe1e4 r4:df911dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ab9800 r4:829185c0 r4:00000000 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8544bf8c r4:8544bc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544bf8c r4:853b6380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab9800 r8:853b63ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853b6380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6380 r8:8027ed34 r7:eb139e60 r6:84a37b00 r5:84ab9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c0b80 INFO: task kworker/0:573:4596 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 859ca000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:853b6400 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:4599 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb149d84 r8:00000002 r7:60000113 r6:eb149d8c r5:84abb000 r4:84abb000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84abb000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0240 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84abb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bb8c r4:8544b800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544bb8c r4:853b6480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abb000 r8:853b64ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:853b6480 r8:8027ed34 r7:eb141e60 r6:84a37c00 r5:84abb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8603f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abc800 r8:853b652c r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:4603 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:84abd400 r4:84abd400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84abd400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8545438c r4:85454000 r4:853b6580 5fa0: 00000000 00000000 00000000 00000000 Call trace: 1d20: 86929000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:4605 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:84abbc00 r4:84abbc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84abbc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c42c0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:853b662c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d20: 869b8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:4607 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:4607 tgid:4607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb129d84 r8:00000002 r7:60000113 r6:eb129d8c r5:85425400 r4:85425400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85425400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:853b6680 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:4610 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:85426c00 r4:85426c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85426c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4880 r5:8545578c r4:85455400 r4:853b6780 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:4612 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb169d84 r8:00000002 r7:60000013 r6:eb169d8c r5:85426000 r5:85426000 r4:829185c0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4700 r5:8545538c r4:85455000 r10:61c88647 r9:85426000 r8:853b68ac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:582 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85420c00 r8:853b69ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 87cd4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:583 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85455b8c r4:85455800 r4:853b6a80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:4619 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85428000 r4:829185c0 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:853b6b80 r8:8027ed34 r7:eb16de60 r6:853b6c00 r5:85428000 INFO: task kworker/0:584:4619 is blocked on a mutex likely owned by task kworker/1:1:43. 1d20: 87f2a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:4620 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85428c00 r4:829185c0 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:853b6c80 r8:8027ed34 r7:eb175e60 r6:853b6d00 r5:85428c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8819b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:4622 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:85429800 r4:85429800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85429800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4fc0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85429800 r8:853b6dac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853c4c40 INFO: task kworker/0:586:4622 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8833d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:4624 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:8542a400 r4:8542a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:853b6e80 r8:8027ed34 r7:eb181e60 r6:853b6f00 r5:8542a400 r4:853bcf40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 88596000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdf911fb0 to 0xdf911ff8) INFO: task kworker/0:588:4625 blocked for more than 471 seconds. r5:8542b000 r4:829185c0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc000 r5:85456f8c r4:85456c00 r10:61c88647 r9:8542b000 r8:853b6fac r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853bcf40 INFO: task kworker/0:588:4625 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 88903000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:4628 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8542bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0069000 r5:8545778c r4:85457400 r10:61c88647 r9:8542bc00 r8:849200ac r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:df911dc0 r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:4630 blocked for more than 471 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8542d400 r4:8542d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849034c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8542d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00eb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457b8c r4:85457800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85457b8c r4:84920180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542d400 r8:849201ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920180 r8:8027ed34 r7:eb18de60 r6:84920200 r5:8542d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84903100 INFO: task kworker/0:590:4630 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 88d0c000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 INFO: task kworker/0:591:4632 blocked for more than 471 seconds. task:kworker/0:591 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:8542ec00 r4:8542ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849037c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8542ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8542ec00 r8:849202ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdf911d20 to 0xdf911d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:592 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb19dd84 r8:00000002 r7:60000013 r6:eb19dd8c r5:84a08000 r4:84a08000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a08000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5fb40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a08000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e8000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ca38c r4:852ca000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ca38c r4:84920380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08000 r8:849203ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920380 r8:8027ed34 r7:eb195e60 r6:84920400 r5:84a08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:592:4634 is blocked on a mutex likely owned by task kworker/1:1:43. 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:df911dc0 r5:00001000 r4:dfeeb000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:593 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:84a09800 r4:84a09800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a09800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903d80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a09800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546478c r4:85464400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546478c r4:84920480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a09800 r8:849204ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920480 r8:8027ed34 r7:eb19de60 r6:84920500 r5:84a09800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84903840 Call trace: 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfeeb000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a0b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b400 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cab8c r4:852ca800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852cab8c r4:84a37e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0b000 r8:84a37e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a37e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a37e00 r8:8027ed34 r7:eb0fde60 r6:84a37e80 r5:84a0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5fb00 INFO: task kworker/1:172:4639 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 898ec000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xdf911fb0 to 0xdf911ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:594:4640 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r4:84ab8c00 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8546438c r4:85464000 r7:dddced40 r6:83018000 r5:8546438c r4:84920580 r10:61c88647 r9:84ab8c00 r8:849205ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920580 r8:8027ed34 r7:eb1a1e60 r6:84a37f00 r5:84ab8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84903580 INFO: task kworker/0:594:4640 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 89c07000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:4643 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb199d84 r8:00000002 r7:60000013 r6:eb199d8c r5:84abe000 r4:84abe000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84abe000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84abe000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85464b8c r4:85464800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85464b8c r4:84920600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abe000 r8:8492062c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 1d60: 80000013 ffffffff [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:596 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546538c r4:85465000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546538c r4:84920680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abec00 r8:849206ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920680 r8:8027ed34 r7:eb199e60 r6:848ba000 r5:84abec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84903d40 INFO: task kworker/0:596:4645 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8a150000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:4647 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:85350000 r4:85350000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85350000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85350000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85464f8c r4:85464c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85464f8c r4:84920700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85350000 r8:8492072c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920700 r8:8027ed34 r7:eb1ade60 r6:848ba080 r5:85350000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84903e80 INFO: task kworker/0:597:4647 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8a450000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:4649 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:85351800 r4:85351800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85351800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85351800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546578c r4:85465400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546578c r4:84920780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85351800 r8:849207ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920780 r8:8027ed34 r7:eb1ade60 r6:848ba100 r5:85351800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84903f00 INFO: task kworker/0:598:4649 is blocked on a mutex likely owned by task kworker/1:1:43. Workqueue: events bpf_prog_free_deferred Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8a450000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:4651 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1c5d84 r8:00000002 r7:60000013 r6:eb1c5d8c r5:85350c00 r4:85350c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85350c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85350c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacad000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85465f8c r4:85465c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85465f8c r4:84920800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85350c00 r8:8492082c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920800 r8:8027ed34 r7:eb1bde60 r6:848ba180 r5:85350c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b45000 INFO: task kworker/0:599:4651 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8a83c000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:4652 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:85353000 r4:85353000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85353000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45000 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85353000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac79000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85465b8c r4:85465800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85465b8c r4:84920880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85353000 r8:849208ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920880 r8:8027ed34 r7:eb1c5e60 r6:848ba200 r5:85353000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b45240 INFO: task kworker/0:600:4652 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8aa6f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:4654 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:4654 tgid:4654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1d1d84 r8:00000002 r7:60000113 r6:eb1d1d8c r5:85352400 r4:85352400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85352400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45c40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85352400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb21d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546738c r4:85467000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546738c r4:84920900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85352400 r8:8492092c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920900 r8:8027ed34 r7:eb1c5e60 r6:848ba280 r5:85352400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b45240 INFO: task kworker/0:601:4654 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8aa6f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b455c0 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546638c r4:84920980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85355400 r8:849209ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920980 r8:8027ed34 r7:eb1d1e60 r6:848ba300 r5:85355400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b45280 INFO: task kworker/0:602:4656 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8af8b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:833b4e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:603 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85356c00 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8546678c r4:85466400 r10:61c88647 r9:85356c00 r8:84920a2c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8af8b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:4660 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:4660 tgid:4660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:85354800 r4:85354800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85354800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45840 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85354800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85466b8c r4:85466800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85466b8c r4:84920a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:604:4660 is blocked on a mutex likely owned by task kworker/1:1:43. r4:00000000 r4:82abe1e4 r4:df911dc0 r5:00001000 r4:dfeeb000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:173:4663 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1a5d84 r8:00000002 r7:60000113 r6:eb1a5d8c r5:85353c00 r4:85353c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85353c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b680 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85353c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cb38c r4:852cb000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852cb38c r4:848ba480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85353c00 r8:848ba4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848ba480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ba480 r8:8027ed34 r7:eb0fde60 r6:848ba500 r5:85353c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7b300 INFO: task kworker/1:173:4663 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8b388000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 r4:833b4e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:4666 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1b1d84 r8:00000002 r7:60000113 r6:eb1b1d8c r5:85356000 r4:85356000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85356000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:848ba580 r8:8027ed34 r7:eb1a5e60 r6:848ba600 r5:85356000 INFO: task kworker/1:174:4666 is blocked on a mutex likely owned by task kworker/1:1:43. 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r5:84b1eb8c r4:84b1e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:4667 tgid:4667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:8534d400 r4:8534d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8534d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cb78c r4:852cb400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852cb78c r4:848ba680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534d400 r8:848ba6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848ba680 Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdf911d20 to 0xdf911d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:4669 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb221d84 r8:00000002 r7:60000013 r6:eb221d8c r5:85358000 r4:85358000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85358000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85358000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb211000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85466f8c r4:85466c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85466f8c r4:84920b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85358000 r8:84920b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920b00 r8:8027ed34 r7:eb1d1e60 r6:848ba780 r5:85358000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b459c0 INFO: task kworker/0:605:4669 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 Exception stack(0xdf911d20 to 0xdf911d68) r5:80000013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:4671 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:85359800 r4:85359800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85359800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45d40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85359800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb229000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546778c r4:85467400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546778c r4:84920b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85359800 r8:84920bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920b80 r8:8027ed34 r7:eb1d1e60 r6:848ba800 r5:85359800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b45a40 INFO: task kworker/0:606:4671 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8be11000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 r4:df911dc0 r4:00000000 r5:00001000 r4:dfeeb000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:4673 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:4673 tgid:4673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb241d84 r8:00000002 r7:60000113 r6:eb241d8c r5:85358c00 r4:85358c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85358c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85358c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb239000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85467b8c r4:85467800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85467b8c r4:84920c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85358c00 r8:84920c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920c00 r8:8027ed34 r7:eb231e60 r6:848ba880 r5:85358c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb241fb0 to 0xeb241ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80000013 ffffffff r4:df911dc0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:4675 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb259d84 r8:00000002 r7:60000013 r6:eb259d8c r5:8535bc00 r4:8535bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84920c80 Exception stack(0xeb259fb0 to 0xeb259ff8) task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:4676 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:8535a400 r4:8535a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45900 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8535a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb249000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85467f8c r4:85467c00 r7:dddced40 r6:83018000 r5:85467f8c r4:84920d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920d00 r8:8027ed34 r7:eb259e60 r6:848ba980 r5:8535a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b45cc0 INFO: task kworker/0:609:4676 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) r4:82abe1e4 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:610 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d0700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8535b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb279000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85468b8c r4:85468800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85468b8c r4:84920d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535b000 r8:84920dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920d80 r8:8027ed34 r7:eb259e60 r6:848baa00 r5:8535b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b45fc0 INFO: task kworker/0:610:4679 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000013 r4:80239bd0 r4:df911dc0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b4e00 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:611:4680 blocked for more than 472 seconds. r4:8535c800 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:8535c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546878c r4:85468400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546878c r4:84920e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535c800 r8:84920e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920e00 r8:8027ed34 r7:eb271e60 r6:848baa80 r5:8535c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5f6c0 INFO: task kworker/0:611:4680 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8d1c7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:4683 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb28dd84 r8:00000002 r7:60000113 r6:eb28dd8c r5:8535ec00 r4:8535ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8535ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb295000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546938c r4:85469000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546938c r4:84920e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535ec00 r8:84920eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920e80 r8:8027ed34 r7:eb271e60 r6:848bab00 r5:8535ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5f240 INFO: task kworker/0:612:4683 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8d1c7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:4684 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:4684 tgid:4684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:8535d400 r4:8535d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b690c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8535d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85468f8c r4:85468c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85468f8c r4:84920f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535d400 r8:84920f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84920f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920f00 r8:8027ed34 r7:eb28de60 r6:848bab80 r5:8535d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb299fb0 to 0xeb299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b69000 INFO: task kworker/0:613:4684 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8d68a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:4686 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2a1d84 r8:00000002 r7:60000013 r6:eb2a1d8c r5:84908c00 r4:84908c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84908c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84908c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85469f8c r4:85469c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85469f8c r4:84920f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84908c00 r8:84920fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84920f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84920f80 r8:8027ed34 r7:eb28de60 r6:848bac00 r5:84908c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b69100 INFO: task kworker/0:614:4686 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8da19000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:4688 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:84908000 r4:84908000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84908000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546978c r4:85469400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546978c r4:84b5a000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84908000 r8:84b5a02c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a000 r8:8027ed34 r7:eb2a1e60 r6:848bac80 r5:84908000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b691c0 INFO: task kworker/0:615:4688 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8dd59000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:4691 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:8490a400 r4:8490a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:8490a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8490a400 r8:84b5a0ac r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a080 r8:8027ed34 r7:eb2a1e60 r6:848bad00 r5:8490a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b691c0 INFO: task kworker/0:616:4691 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8e205000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:4693 blocked for more than 472 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:8490b000 r4:8490b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492af80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8490b000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead13000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497478c r4:84974400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8497478c r4:848bad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490b000 r8:848badac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848bad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bad80 r8:8027ed34 r7:eb1b1e60 r6:848bae00 r5:8490b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8492a1c0 INFO: task kworker/1:176:4693 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8e4e8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:617:4694 blocked for more than 472 seconds. r5:8490bc00 r4:829185c0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b699c0 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b693c0 INFO: task kworker/0:617:4694 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8e5a4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:4697 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:4697 tgid:4697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae8dd84 r8:00000002 r7:60000113 r6:eae8dd8c r5:8490c800 r4:8490c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8490c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546a38c r4:8546a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546a38c r4:84b5a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490c800 r8:84b5a1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a180 r8:8027ed34 r7:eb2d1e60 r6:848baf00 r5:8490c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b69680 INFO: task kworker/0:618:4697 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8e7a3000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:4698 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:8490d400 r4:8490d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69b40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8490d400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe37000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546ab8c r4:8546a800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546ab8c r4:84b5a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490d400 r8:84b5a22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a200 r8:8027ed34 r7:eb2d1e60 r6:848baf80 r5:8490d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b69840 INFO: task kworker/0:619:4698 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8ea83000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:620 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:8490e000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:852cbb8c r4:852cb800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cbb8c r4:84b5a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490e000 r8:84b5a2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a280 r8:8027ed34 r7:eb2e5e60 r6:84930000 r5:8490e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b696c0 INFO: task kworker/0:620:4700 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8ecd8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r5:8546af8c r4:8546ac00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:622:4707 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:622 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:85480000 r4:85480000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85480000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r5:8546b38c r4:8546b000 r4:00000001 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r4:00000000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:833b5d80 [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0713000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8f91f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85482400 r8:84b5a4ac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82abe1e4 r4:00000000 r5:84b1eb8c r4:84b1e800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a0e000 r4:829185c0 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b000 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88bb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546bf8c r4:8546bc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546bf8c r4:84b5a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0e000 r8:84b5a52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a500 r8:8027ed34 r7:eb301e60 r6:84b5a580 r5:84a0e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b69dc0 INFO: task kworker/0:625:4711 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8fd0f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:626 state:D stack:0 pid:4714 tgid:4714 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849220c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546c38c r4:8546c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546c38c r4:84b5a600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0ec00 r8:84b5a62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a600 r8:8027ed34 r7:eb2f1e60 r6:84b5a680 r5:84a0ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7b800 INFO: task kworker/0:626:4714 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 8ffe2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:4715 blocked for more than 473 seconds. task:kworker/0:627 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84922280 r9:83018005 r8:84a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d9000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546c78c r4:8546c400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546c78c r4:84b5a700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0d400 r8:84b5a72c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a700 r8:8027ed34 r7:eb2fde60 r6:84b5a780 r5:84a0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7b800 INFO: task kworker/0:627:4715 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 90666000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:628 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a0bc00 r4:829185c0 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eaa45000 r5:8546cb8c r4:8546c800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546cb8c r4:84b5a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0bc00 r8:84b5a82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a800 r8:8027ed34 r7:eb26de60 r6:84b5a880 r5:84a0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84922100 INFO: task kworker/0:628:4718 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 90666000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b1eb8c r4:84b1e800 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:629:4721 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r5:84a0c800 r4:829185c0 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8546cf8c r4:84b5a900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0c800 r8:84b5a92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5a900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5a900 r8:8027ed34 r7:eb309e60 r6:84b5a980 r5:84a0c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84922200 INFO: task kworker/0:629:4721 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 90d3b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:630:4722 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:84a0a400 r4:84a0a400 r5:84a0a400 r4:829185c0 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849223c0 INFO: task kworker/0:630:4722 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 911ff000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:4724 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8542e000 r4:829185c0 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546d38c r4:84b5ab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542e000 r8:84b5ab2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5ab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5ab00 r8:8027ed34 r7:eb315e60 r6:84b5ab80 r5:8542e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849225c0 INFO: task kworker/0:631:4724 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 91585000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:632:4725 blocked for more than 473 seconds. [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849f8000 r8:84b5ac2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeb31dfb0 to 0xeb31dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 91bc4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:4727 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:4727 tgid:4727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb321d84 r8:00000002 r7:60000013 r6:eb321d8c r5:849f8c00 r4:849f8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84922e00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546df8c r4:8546dc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546df8c r4:84b5ad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f8c00 r8:84b5ad2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b5ad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b5ad00 r8:8027ed34 r7:eb315e60 r6:84b5ad80 r5:849f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84922a40 INFO: task kworker/0:633:4727 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 91d77000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:849fb000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62040 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b5ae00 Exception stack(0xeb329fb0 to 0xeb329ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 921c2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:4732 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:849fa400 r4:849fa400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849fa400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492ca80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf57000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497438c r4:84974000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8497438c r4:84930280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fa400 r8:849302ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84930280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84930280 r8:8027ed34 r7:eb1b1e60 r6:84b5af00 r5:849fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8492a980 INFO: task kworker/1:177:4732 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 921c2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 r4:849fbc00 r5:849fbc00 r4:829185c0 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849fbc00 r8:84b5afac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf911d20 to 0xdf911d68) 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:4737 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:849fc800 r4:849fc800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849fc800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546eb8c r4:8546e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546eb8c r4:84b65080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fc800 r8:84b650ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65080 r8:8027ed34 r7:eb329e60 r6:84b65100 r5:849fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b621c0 INFO: task kworker/0:636:4737 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d60: 80000013 ffffffff r4:df911dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:4738 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb331d84 r8:00000002 r7:60000013 r6:eb331d8c r5:849fd400 r4:849fd400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849fd400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546ef8c r4:84b65180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fd400 r8:84b651ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65180 r8:8027ed34 r7:eb30de60 r6:84b65200 r5:849fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb331fb0 to 0xeb331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b62100 INFO: task kworker/0:637:4738 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 r4:849fe000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b625c0 r5:8546f38c r4:8546f000 r10:61c88647 r9:849fe000 r8:84b652ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeb335fb0 to 0xeb335ff8) r4:84b622c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 929a7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:639:4742 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:639 state:D stack:0 pid:4742 tgid:4742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:849fec00 r4:849fec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849fec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b627c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae41000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546f78c r4:8546f400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546f78c r4:84b65380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fec00 r8:84b653ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65380 r8:8027ed34 r7:eb335e60 r6:84b65400 r5:849fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb339fb0 to 0xeb339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b623c0 INFO: task kworker/0:639:4742 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 92c65000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:640:4745 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:640 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:849f9800 r4:849f9800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f9800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62a40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7f000 r5:8546ff8c r4:8546fc00 r4:84b65480 Exception stack(0xeb33dfb0 to 0xeb33dff8) INFO: task kworker/0:640:4745 is blocked on a mutex likely owned by task kworker/1:1:43. Exception stack(0xdf911d20 to 0xdf911d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r4:833b5d80 task:kworker/0:641 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8542c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b628c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8542c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546fb8c r4:8546f800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8546fb8c r4:84b65580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542c800 r8:84b655ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65580 r8:8027ed34 r7:eb33de60 r6:84b65600 r5:8542c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b62640 INFO: task kworker/0:641:4746 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 93438000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:642:4748 blocked for more than 473 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:642 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb341d84 r8:00000002 r7:60000113 r6:eb341d8c r5:84a08c00 r4:84a08c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a08c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62c00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeab000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547838c r4:85478000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547838c r4:84b65680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08c00 r8:84b656ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65680 r8:8027ed34 r7:eb33de60 r6:84b65700 r5:84a08c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b62840 INFO: task kworker/0:642:4748 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 936bc000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:4750 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84818000 r4:84818000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84818000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84818000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547878c r4:85478400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547878c r4:84b65780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818000 r8:84b657ac r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bd0 r4:df911dc0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:84818c00 r4:84818c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84818c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62ec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85478b8c r4:85478800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85478b8c r4:84b65880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818c00 r8:84b658ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65880 r8:8027ed34 r7:eb349e60 r6:84b65900 r5:84818c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b62c40 INFO: task kworker/0:644:4753 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 93fab000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:df911dc0 r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:645:4754 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:84819800 r4:84819800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84819800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907040 r5:00001000 r4:eaf13000 r7:dddced40 r6:83018000 r5:85478f8c r4:84b65980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84819800 r8:84b659ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65980 r8:8027ed34 r7:eb34de60 r6:84b65a00 r5:84819800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 1d20: 9454a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb359d84 r8:00000002 r7:60000113 r6:eb359d8c r5:8481a400 r4:8481a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8481a400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf25000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547938c r4:85479000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547938c r4:84b65a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481a400 r8:84b65aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65a80 r8:8027ed34 r7:eb351e60 r6:84b65b00 r5:8481a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b62cc0 INFO: task kworker/0:646:4755 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80000013 ffffffff r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85484800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85484800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85479b8c r4:85479800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85479b8c r4:84b65b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85484800 r8:84b65bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65b80 r8:8027ed34 r7:eb359e60 r6:84930300 r5:85484800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907100 INFO: task kworker/0:647:4757 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 94c9f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:4759 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85483000 r5:85483000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b65c00 r8:8027ed34 r7:eb365e60 r6:84930380 r5:85483000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:849072c0 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 1d20: 94e0d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:4762 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:4762 tgid:4762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb355d84 r8:00000002 r7:60000013 r6:eb355d8c r5:85485400 r4:85485400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85485400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907700 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85485400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafff000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85479f8c r4:85479c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85479f8c r4:84b65c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85485400 r8:84b65cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65c80 r8:8027ed34 r7:eb365e60 r6:84930400 r5:85485400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907300 INFO: task kworker/0:649:4762 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 950f1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:178:4763 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:85486000 r4:85486000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85486000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6f00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85486000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f078c r4:853f0400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f078c r4:84930480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85486000 r8:849304ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84930480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84930480 r8:8027ed34 r7:eb1b1e60 r6:84930500 r5:85486000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb361fb0 to 0xeb361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8492ca40 Workqueue: events bpf_prog_free_deferred 1d20: 955a2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:4766 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb371d84 r8:00000002 r7:60000113 r6:eb371d8c r5:85481800 r4:85481800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85481800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492c740 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85481800 r8:849305ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 9575d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:650:4768 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:650 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb35dd84 r8:00000002 r7:60000013 r6:eb35dd8c r5:8481bc00 r4:8481bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907840 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8481bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547a38c r4:8547a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547a38c r4:84b65d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481bc00 r8:84b65d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65d00 r8:8027ed34 r7:eb355e60 r6:84b65d80 r5:8481bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907580 INFO: task kworker/0:650:4768 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 95b33000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:4770 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:4770 tgid:4770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb36dd84 r8:00000002 r7:60000013 r6:eb36dd8c r5:8481c800 r4:8481c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547af8c r4:8547ac00 r10:61c88647 r9:8481c800 r8:84b65e2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907580 INFO: task kworker/0:651:4770 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 95e72000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:4771 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb375d84 r8:00000002 r7:60000013 r6:eb375d8c r5:8481d400 r4:8481d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907a00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8481d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb027000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547a78c r4:8547a400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547a78c r4:84b65f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481d400 r8:84b65f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b65f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b65f00 r8:8027ed34 r7:eb36de60 r6:84b65f80 r5:8481d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb375fb0 to 0xeb375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907940 INFO: task kworker/0:652:4771 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 95e72000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:4773 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:8481ec00 r4:8481ec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481ec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907b80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8481ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547ab8c r4:8547a800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547ab8c r4:854b8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481ec00 r8:854b802c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8000 r8:8027ed34 r7:eb36de60 r6:854b8080 r5:8481ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907b40 INFO: task kworker/0:653:4773 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 962ea000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdf911fb0 to 0xdf911ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:4776 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:4776 tgid:4776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb381d84 r8:00000002 r7:60000113 r6:eb381d8c r5:854e0000 r4:854e0000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e0000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a580 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa47000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547bb8c r4:8547b800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547bb8c r4:854b8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e0000 r8:854b812c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8100 r8:8027ed34 r7:eb36de60 r6:854b8180 r5:854e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb381fb0 to 0xeb381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907c00 INFO: task kworker/0:654:4776 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: 962ea000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:4777 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb385d84 r8:00000002 r7:60000113 r6:eb385d8c r5:854e0c00 r4:854e0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb177000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547b38c r4:8547b000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547b38c r4:854b8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e0c00 r8:854b822c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8200 r8:8027ed34 r7:eb381e60 r6:854b8280 r5:854e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb385fb0 to 0xeb385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907c00 INFO: task kworker/0:655:4777 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 966e8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:4780 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85483c00 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547b78c r4:8547b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:854b8300 r8:8027ed34 r7:eb381e60 r6:84930680 r5:85483c00 dfa0: 00000000 00000000 00000000 00000000 r4:84907f40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 966e8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:4783 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb245d84 r8:00000002 r7:60000113 r6:eb245d8c r5:84909800 r4:84909800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84909800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854dcb8c r4:854dc800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:854b8380 r8:8027ed34 r7:eb381e60 r6:84930700 r5:84909800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9697a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:4784 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb24dd84 r8:00000002 r7:60000113 r6:eb24dd8c r5:85488000 r4:85488000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85488000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba100 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85488000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd55000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547bf8c r4:8547bc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547bf8c r4:854b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85488000 r8:854b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8400 r8:8027ed34 r7:eb245e60 r6:84930780 r5:85488000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84907f00 INFO: task kworker/0:658:4784 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 96bed000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:4786 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:4786 tgid:4786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb391d84 r8:00000002 r7:60000113 r6:eb391d8c r5:85489800 r4:85489800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85489800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85489800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff33000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dc38c r4:854dc000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854dc38c r4:854b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85489800 r8:854b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8500 r8:8027ed34 r7:eb245e60 r6:84930800 r5:85489800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854ba280 INFO: task kworker/0:659:4786 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:4788 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:85488c00 r4:00000000 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:4791 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:4791 tgid:4791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:8548b000 r4:8548b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba2c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8548b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dcf8c r4:854dcc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854dcf8c r4:854b8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548b000 r8:854b85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8580 r8:8027ed34 r7:eb399e60 r6:84930900 r5:8548b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 97497000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:4793 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:8548a400 r4:8548a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba7c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8548a400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4801000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dd38c r4:854dd000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854dd38c r4:854b8600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548a400 r8:854b862c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8600 r8:8027ed34 r7:eb399e60 r6:84930980 r5:8548a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:854ba4c0 Call trace: 1d60: 80000013 ffffffff r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:4796 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:8548bc00 r4:8548bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854baa40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8548bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf3000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854b8680 r8:8027ed34 r7:eb399e60 r6:84930a00 r5:8548bc00 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:4797 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r4:8548c800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548c800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854baf00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8548c800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac81000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854b8700 r8:8027ed34 r7:eb3b5e60 r6:84930a80 r5:8548c800 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abe1e4 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bab80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8548d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ddf8c r4:854ddc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ddf8c r4:854b8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548d400 r8:854b87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8780 r8:8027ed34 r7:eb3b9e60 r6:84930b00 r5:8548d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854ba8c0 INFO: task kworker/0:665:4800 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 97cda000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bad00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85486c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854de38c r4:854de000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854de38c r4:854b8800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85486c00 r8:854b882c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8800 r8:8027ed34 r7:eb3b9e60 r6:84930b80 r5:85486c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 9806e000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b1eb8c r4:84b1e800 r4:833b4e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492c300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8548ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f0f8c r4:853f0c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f0f8c r4:84930c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548ec00 r8:84930c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84930c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84930c00 r8:8027ed34 r7:eb361e60 r6:84930c80 r5:8548ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c6d80 INFO: task kworker/1:180:4804 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 98626000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:df911dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:4805 blocked for more than 474 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:8548e000 r4:8548e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:668:4808 blocked for more than 474 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:668 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:8535e000 r4:8535e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0540 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8535e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854df78c r4:854df400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854b8900 Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:4809 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:85490000 r5:85490000 r4:829185c0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6140 r9:83018205 r8:85490000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:853f0b8c r4:853f0800 Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:4810 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:4810 tgid:4810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3d9d84 r8:00000002 r7:60000013 r6:eb3d9d8c r5:85490c00 r4:85490c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85490c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0080 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb067000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854def8c r4:854dec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854b8980 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d20: 989df000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:670:4812 blocked for more than 475 seconds. Call trace: r5:85492400 r4:829185c0 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:4816 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:85493000 r4:85493000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85493000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4b80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f238c r4:853f2000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8492c240 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:183:4817 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:85493c00 r4:85493c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85493c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85493c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb273000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f138c r4:853f1000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f138c r4:854d8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493c00 r8:854d812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: 990d4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 INFO: task kworker/0:671:4818 blocked for more than 475 seconds. r5:85494800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0600 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85494800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb207000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dfb8c r4:854df800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854dfb8c r4:854b8a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85494800 r8:854b8aac r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8a80 r8:8027ed34 r7:eb3d1e60 r6:854d8200 r5:85494800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 INFO: task kworker/0:672:4821 blocked for more than 475 seconds. r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8551878c r4:85518400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551878c r4:854b8b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85495400 r8:854b8b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8b00 r8:8027ed34 r7:eb3e5e60 r6:854d8280 r5:85495400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854d0480 INFO: task kworker/0:672:4821 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 99732000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85496c00 r8:854b8bac r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8b80 r8:8027ed34 r7:eb3f1e60 r6:854d8300 r5:85496c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854d05c0 INFO: task kworker/0:673:4822 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 99c49000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:df911dc0 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b5d80 r5:85498c00 r4:829185c0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:854b8c80 Exception stack(0xeb415fb0 to 0xeb415ff8) Workqueue: events bpf_prog_free_deferred r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:4826 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb419d84 r8:00000002 r7:60000013 r6:eb419d8c r5:85499800 r4:85499800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85499800 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb253000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854d0880 INFO: task kworker/0:675:4826 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) INFO: task kworker/0:676:4828 blocked for more than 475 seconds. r5:8549a400 r4:829185c0 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0e40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8549a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551938c r4:85519000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551938c r4:854b8d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549a400 r8:854b8dac r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b8d80 r8:8027ed34 r7:eb419e60 r6:854d8480 r5:8549a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:4831 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:8549b000 r4:8549b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:61c88647 r9:8549b000 r8:854d852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854d4700 Exception stack(0xdf911d20 to 0xdf911d68) r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:8549bc00 r4:8549bc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549bc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4c40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8549bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28f000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f1b8c r4:853f1800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f1b8c r4:854d8600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549bc00 r8:854d862c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:854d8600 r8:8027ed34 r7:eb3c1e60 r6:854d8680 r5:8549bc00 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:00000001 task:kworker/0:677 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0f40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8549c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b3000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551978c r4:85519400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551978c r4:854b8e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549c800 r8:854b8e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b8e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:854d09c0 1d20: 9ab07000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:833b5d80 r4:8549d400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8549d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb443000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f1f8c r4:853f1c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f1f8c r4:854d8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549d400 r8:854d87ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854d8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d8780 r8:8027ed34 r7:eb3c1e60 r6:854d8800 r5:8549d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854d4b80 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b5d80 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0fc0 r5:85519b8c r4:85519800 r10:00000000 r9:854b8e80 r8:8027ed34 r7:eb421e60 r6:854d8880 r5:8549e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854d0f80 INFO: task kworker/0:678:4839 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9b1ff000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.16.0-rc3-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r5:8551af8c r4:8551ac00 r4:00000001 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:4842 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3e9d84 r8:00000002 r7:60000013 r6:eb3e9d8c r5:854e3c00 r4:854e3c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e3c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0240 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) Workqueue: events bpf_prog_free_deferred r4:82abe1e4 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 1fa0: 00000000 00000000 00000000 00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba080 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2db000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551a38c r4:8551a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551a38c r4:8519f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e6000 r8:8519f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f080 r8:8027ed34 r7:eb439e60 r6:8519f100 r5:854e6000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:681:4844 is blocked on a mutex likely owned by task kworker/1:1:43. [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:682 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:854e6c00 r8:8519f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f180 r8:8027ed34 r7:eb439e60 r6:8519f200 r5:854e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854ba300 INFO: task kworker/0:682:4845 is blocked on a mutex likely owned by task kworker/1:1:43. r4:82abe1e4 r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.16.0-rc3-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854d4380 INFO: task kworker/1:187:4848 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9bd65000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:4850 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 task:kworker/1:188 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r10:61c88647 r9:85491800 r8:854d8aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:188:4850 is blocked on a mutex likely owned by task kworker/1:1:43. 1d60: 80000013 ffffffff r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc3-syzkaller #0 r4:854a0000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8518e3c0 INFO: task kworker/0:683:4853 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9c060000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:4854 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:854a0c00 r4:854a0c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a0c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f400 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:854d8b80 r8:8027ed34 r7:eb435e60 r6:854d8c80 r5:854a0c00 INFO: task kworker/1:189:4854 is blocked on a mutex likely owned by task kworker/1:1:43. r5:80000013 r4:80239bd0 r4:df911dc0 r5:00001000 r4:dfeeb000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 1fa0: 00000000 00000000 00000000 00000000 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:4857 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:854a3000 r4:854a3000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a3000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ed40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06dd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551c38c r4:8551c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551c38c r4:8519f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a3000 r8:8519f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f300 r8:8027ed34 r7:eb439e60 r6:854d8d00 r5:854a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518e600 INFO: task kworker/0:684:4857 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9c435000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:833b4e00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:685 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:854a3c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a3c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551b38c r4:8551b000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551b38c r4:8519f380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a3c00 r8:8519f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f380 r8:8027ed34 r7:eb491e60 r6:854d8d80 r5:854a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518e600 INFO: task kworker/0:685:4858 is blocked on a mutex likely owned by task kworker/1:1:43. [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df911dc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r10:61c88647 r9:854a4800 r8:8519f42c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:4863 blocked for more than 475 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:4863 tgid:4863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4a1d84 r8:00000002 r7:60000013 r6:eb4a1d8c r5:854a1800 r4:854a1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ebc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551bf8c r4:8551bc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551bf8c r4:8519f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a1800 r8:8519f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdf911d20 to 0xdf911d68) r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:688:4865 blocked for more than 475 seconds. r10:829185c4 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:854a6000 r4:854a6000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a6000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f300 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551d78c r4:8551d400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551d78c r4:8519f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6000 r8:8519f52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f500 r8:8027ed34 r7:eb491e60 r6:854d8f00 r5:854a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ed00 INFO: task kworker/0:688:4865 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9cd1f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:689:4867 blocked for more than 476 seconds. r5:854a5400 r4:829185c0 r4:00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518eec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0779000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551c78c r4:8551c400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551c78c r4:8519f580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a5400 r8:8519f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f580 r8:8027ed34 r7:eb4a9e60 r6:854d8f80 r5:854a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518eac0 INFO: task kworker/0:689:4867 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:4869 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:4869 tgid:4869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:854a6c00 r4:854a6c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a6c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8551cb8c r4:8519f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6c00 r8:8519f62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f600 r8:8027ed34 r7:eb4a9e60 r6:850aa000 r5:854a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:4871 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:4871 tgid:4871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:854a2400 r4:854a2400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a2400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e180 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea997000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551cf8c r4:8551cc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551cf8c r4:8519f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a2400 r8:8519f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f680 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f040 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551d38c r4:8551d000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551d38c r4:8519f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a8c00 r8:8519f72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f700 r8:8027ed34 r7:eb4a9e60 r6:850aa100 r5:854a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516f080 INFO: task kworker/0:692:4873 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdf911d20 to 0xdf911d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551df8c r4:8551dc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551df8c r4:8519f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a8000 r8:8519f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f780 r8:8027ed34 r7:eb4a9e60 r6:850aa180 r5:854a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516f080 INFO: task kworker/0:693:4875 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9d9d7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:4877 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4d9d84 r8:00000002 r7:60000013 r6:eb4d9d8c r5:854a9800 r4:854a9800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a9800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:854ab000 r4:854ab000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ab000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516d140 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f378c r4:853f3400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f378c r4:850aa280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ab000 r8:850aa2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850aa280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850aa280 r8:8027ed34 r7:eb435e60 r6:850aa300 r5:854ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:4881 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb459d84 r8:00000002 r7:60000113 r6:eb459d8c r5:854abc00 r4:854abc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854abc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a8d80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 r5:853f2f8c r4:853f2c00 r4:850aa380 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9e27f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:833b5d80 task:kworker/1:192 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:850aa480 r4:851a8140 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 INFO: task kworker/0:695:4885 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4e5d84 r8:00000002 r7:60000013 r6:eb4e5d8c r5:854ae000 r4:854ae000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ae000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f840 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8551e38c r4:8551e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:854ad400 r4:854ad400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ad400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516fa00 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae13000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551e78c r4:8551e400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551e78c r4:8519f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ad400 r8:8519f92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f900 r8:8027ed34 r7:eb4d9e60 r6:850aa600 r5:854ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: 9eb53000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:4891 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4f5d84 r8:00000002 r7:60000013 r6:eb4f5d8c r5:85498000 r4:85498000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85498000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8551ef8c r4:8551ec00 r4:8519f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f980 r8:8027ed34 r7:eb4d9e60 r6:850aa680 r5:85498000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516f900 INFO: task kworker/0:697:4891 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80000013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:698 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:4895 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb505d84 r8:00000002 r7:60000113 r6:eb505d8c r5:85552400 r4:85552400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85552400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:df911dc0 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85550000 r4:829185c0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516fec0 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551f78c r4:8551f400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551f78c r4:8519fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85550000 r8:8519fb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fb00 r8:8027ed34 r7:eb4fde60 r6:850aa800 r5:85550000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516fb80 INFO: task kworker/0:700:4897 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: 9f8c5000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:701:4898 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb511d84 r8:00000002 r7:60000113 r6:eb511d8c r5:85551800 r4:85551800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85551800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f640 r5:8551fb8c r4:8551f800 r4:8519fb80 1fa0: 00000000 00000000 00000000 00000000 Call trace: 1d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:193:4901 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:85555400 r4:85555400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85555400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516d280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85555400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb581000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f3b8c r4:853f3800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f3b8c r4:850aa900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:850aa900 INFO: task kworker/1:193:4901 is blocked on a mutex likely owned by task kworker/1:1:43. Exception stack(0xdf911d20 to 0xdf911d68) r4:df911dc0 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:4902 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:85556000 r4:85556000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85556000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8519fc00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: a0809000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:703:4903 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:703 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:85553000 r4:85553000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85553000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8519fc80 r8:8027ed34 r7:eb4fde60 r6:850aaa80 r5:85553000 r4:8516ffc0 Call trace: Exception stack(0xdf911d20 to 0xdf911d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:4905 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:85553c00 r4:85553c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85553c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078280 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85520b8c r4:8519fd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85553c00 r8:8519fd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fd00 r8:8027ed34 r7:eb4fde60 r6:850aab00 r5:85553c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516f180 INFO: task kworker/0:704:4905 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:705 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85521f8c r4:85521c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85521f8c r4:8519fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854aa400 r8:8519fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fd80 r8:8027ed34 r7:eb529e60 r6:850aab80 r5:854aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85078100 INFO: task kworker/0:705:4908 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a14c0000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:4909 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:4909 tgid:4909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:854aec00 r4:854aec00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854aec00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078380 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85520f8c r4:85520c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85520f8c r4:8519fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854aec00 r8:8519fe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fe00 r8:8027ed34 r7:eb535e60 r6:850aac00 r5:854aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80000013 ffffffff r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:4911 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb541d84 r8:00000002 r7:60000113 r6:eb541d8c r5:85558000 r4:85558000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85558000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85558000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb019000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552138c r4:85521000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552138c r4:8519fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85558000 r8:8519feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fe80 r8:8027ed34 r7:eb535e60 r6:850aac80 r5:85558000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850783c0 INFO: task kworker/0:707:4911 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a1764000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8555a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8519ff00 dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85078400 INFO: task kworker/0:708:4914 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a1c08000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85078480 INFO: task kworker/0:709:4915 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a2367000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:710:4918 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 task:kworker/0:710 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85522b8c r4:8519d000 Workqueue: events bpf_prog_free_deferred r4:df911dc0 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:4919 blocked for more than 476 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:8555b000 r4:8555b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8555b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8552238c r4:85522000 r4:8519d080 r10:00000000 r9:8519d080 r8:8027ed34 r7:eb55de60 r6:850aae80 r5:8555b000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85078780 INFO: task kworker/0:711:4919 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a2c83000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:82abe1e4 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Not tainted 6.16.0-rc3-syzkaller #0 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8519d100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d100 r8:8027ed34 r7:eb55de60 r6:850aaf00 r5:8555bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85078940 INFO: task kworker/0:712:4921 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a2e26000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r5:00001000 r4:dfeeb000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:713 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85078940 INFO: task kworker/0:713:4923 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a3410000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8555e000 r4:829185c0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853f3f8c r4:853f3c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f3f8c r4:85170000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555e000 r8:8517002c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170000 r8:8027ed34 r7:eb51de60 r6:85170080 r5:8555e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516d100 INFO: task kworker/1:194:4927 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: a3410000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:00000000 r5:00001000 r4:dfeeb000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8552338c r4:85523000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552338c r4:8519d200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:85078ac0 Call trace: 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:4934 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb261d84 r8:00000002 r7:60000113 r6:eb261d8c r5:849b8000 r4:849b8000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b8000 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85170280 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 INFO: task kworker/0:715:4935 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:715 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3add84 r8:00000002 r7:60000013 r6:eb3add8c r5:849b8c00 r4:849b8c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b8c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc42c0 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911d20 to 0xdf911d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eb449d84 r8:00000002 r7:60000013 r6:eb449d8c r5:849b9800 r4:00000000 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85523f8c r4:85523c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85523f8c r4:8519d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b9800 r8:8519d32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d300 r8:8027ed34 r7:eb3ade60 r6:85170400 r5:849b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4140 INFO: task kworker/0:716:4936 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 Exception stack(0xdf911fb0 to 0xdf911ff8) Call trace: [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eaad5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: r4:df911dc0 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:4942 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:849bbc00 r4:849bbc00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849bbc00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xdf911fb0 to 0xdf911ff8) r4:849bc800 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85524f8c r4:85524c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85524f8c r4:8519d480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849bc800 r8:8519d4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519d480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d480 r8:8027ed34 r7:eb20de60 r6:85170580 r5:849bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb475fb0 to 0xeb475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4400 INFO: task kworker/0:719:4943 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a52d2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:df911dc0 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:720:4945 blocked for more than 477 seconds. r5:849be000 r4:829185c0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849be000 r8:8519d52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519d500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d500 r8:8027ed34 r7:eb475e60 r6:85170600 r5:849be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4580 INFO: task kworker/0:720:4945 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a5576000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) Not tainted 6.16.0-rc3-syzkaller #0 r5:849bd400 r4:829185c0 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4b40 r5:8552538c r4:85525000 r4:8519d580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bc4840 INFO: task kworker/0:721:4947 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a5b99000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r5:8559278c r4:85592400 r10:00000000 r9:85170700 r8:8027ed34 r7:eb261e60 r6:85170780 r5:85554800 r4:8516dfc0 Exception stack(0xdf911d20 to 0xdf911d68) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:722:4950 blocked for more than 477 seconds. r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) r4:84bc4800 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:00000000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:723:4952 blocked for more than 477 seconds. r5:849bec00 r4:829185c0 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:61c88647 r9:849bec00 r8:8519d6ac r7:82804d40 r6:dddced40 r5:dddced60 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:4955 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:849bb000 r4:849bb000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849bb000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a10c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb659000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84974b8c r4:84974800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84974b8c r4:85170900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849bb000 r8:8517092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170900 r8:8027ed34 r7:eb5b1e60 r6:85170980 r5:849bb000 r4:00000001 Exception stack(0xeb215fb0 to 0xeb215ff8) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb1f1000 r5:85525f8c r4:85525c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85525f8c r4:8519d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85560c00 r8:8519d72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d700 r8:8027ed34 r7:eb5bde60 r6:85170a00 r5:85560c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4c80 INFO: task kworker/0:724:4957 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a68ee000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdf911fb0 to 0xdf911ff8) INFO: task kworker/0:725:4960 blocked for more than 477 seconds. Call trace: r5:85560000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096040 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85560000 r8:8519d7ac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a6d97000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:4961 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5d5d84 r8:00000002 r7:60000113 r6:eb5d5d8c r5:85563000 r4:85563000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85563000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4b80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85563000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb203000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552638c r4:85526000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552638c r4:8519d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85563000 r8:8519d82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d800 r8:8027ed34 r7:eb5d1e60 r6:85170b00 r5:85563000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4f40 INFO: task kworker/0:726:4961 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 1d60: 80000013 ffffffff r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:4962 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:85561800 r4:85561800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85561800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516d4c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85561800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb219000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552678c r4:85526400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552678c r4:8519d880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85561800 r8:8519d8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519d880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519d880 r8:8027ed34 r7:eb5d1e60 r6:85170b80 r5:85561800 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85565400 r4:829185c0 r9:83018005 r8:85565400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a7508000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85564800 r4:829185c0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096400 r10:00000000 r9:8519d980 r8:8027ed34 r7:eb5e5e60 r6:85170c80 r5:85564800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85096180 INFO: task kworker/0:729:4968 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a7828000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:730:4969 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 r4:85566000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:df911dc0 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:4971 blocked for more than 477 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5fdd84 r8:00000002 r7:60000113 r6:eb5fdd8c r5:85566c00 r4:85566c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85566c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096940 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:732 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85568000 r4:85568000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85568000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096680 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85568000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb293000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85527b8c r4:85527800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85527b8c r4:8519db00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568000 r8:8519db2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519db00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519db00 r8:8027ed34 r7:eb5fde60 r6:85170e00 r5:85568000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:850965c0 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:733:4974 blocked for more than 477 seconds. task:kworker/0:733 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8519db80 r8:8027ed34 r7:eb5fde60 r6:85170e80 r5:85569800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850965c0 INFO: task kworker/0:733:4974 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a8442000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b1eb8c r4:84b1e800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdf911d20 to 0xdf911d68) 1d60: 80000013 ffffffff r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:833b4e00 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:4979 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:8556b000 r4:8556b000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8556b000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096e40 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8556b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552938c r4:85529000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552938c r4:8519dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556b000 r8:8519dcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519dc80 r8:8027ed34 r7:eb615e60 r6:85170f80 r5:8556b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850967c0 INFO: task kworker/0:735:4979 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a8d76000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 r4:00000001 Exception stack(0xdf911fb0 to 0xdf911ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r4:854e2400 r5:854e2400 r4:829185c0 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85528b8c r4:85528800 r7:dddced40 r6:83018000 r5:85528b8c r4:8519dd00 r10:00000000 r9:8519dd00 r8:8027ed34 r7:eb61de60 r6:8519dd80 r5:854e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850967c0 INFO: task kworker/0:736:4980 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: a8eca000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8519de00 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b1eb8c r4:84b1e800 r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854e5400 r8:8519df2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:4987 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:4987 tgid:4987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:854e1800 r4:854e1800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e1800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85096e80 r4:00000000 r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.16.0-rc3-syzkaller #0 r4:854e3000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f040 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85529b8c r4:85529800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85529b8c r4:84bdf100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e3000 r8:84bdf12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdf100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf100 r8:8027ed34 r7:eb629e60 r6:84bdf180 r5:854e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f000 INFO: task kworker/0:740:4989 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: aa1ba000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:8481b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552a38c r4:8552a000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552a38c r4:84bdf200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481b000 r8:84bdf22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdf200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf200 r8:8027ed34 r7:eb629e60 r6:84bdf280 r5:8481b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f1c0 INFO: task kworker/0:741:4991 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:833b5d80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:8481e000 r4:8481e000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481e000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f5c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8481e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb595000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552a78c r4:8552a400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552a78c r4:84bdf300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481e000 r8:84bdf32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdf300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf300 r8:8027ed34 r7:eb631e60 r6:84bdf380 r5:8481e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f300 INFO: task kworker/0:742:4994 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: aa9b7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:84b1eb8c r4:84b1e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xdf911fb0 to 0xdf911ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r4:84810000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84810000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84810000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb641000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552ab8c r4:8552a800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552ab8c r4:84bdf400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810000 r8:84bdf42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdf400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf400 r8:8027ed34 r7:eb635e60 r6:84bdf480 r5:84810000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f300 INFO: task kworker/0:743:4995 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: aab6a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:4997 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:4997 tgid:4997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:84810c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fcc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb679000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552b78c r4:8552b400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552b78c r4:84bdf500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810c00 r8:84bdf52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdf500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf500 r8:8027ed34 r7:eb639e60 r6:84bdf580 r5:84810c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 INFO: task kworker/0:744:4997 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: aaf3d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:745 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8556a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f8c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8556a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552af8c r4:8552ac00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552af8c r4:84bdf600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556a400 r8:84bdf62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdf600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf600 r8:8027ed34 r7:eb645e60 r6:855aa000 r5:8556a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 INFO: task kworker/0:745:4999 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df911dc0 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:8556bc00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fbc0 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8552b38c r4:84bdf680 r10:00000000 r9:84bdf680 r8:8027ed34 r7:eb645e60 r6:855aa080 r5:8556bc00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:5002 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:8556d400 r4:8556d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8556d400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ac840 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8556d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84975b8c r4:84975800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84975b8c r4:855aa100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556d400 r8:855aa12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855aa100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855aa100 r8:8027ed34 r7:eb5b1e60 r6:855aa180 r5:8556d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8556ec00 r4:829185c0 [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8552bb8c r4:8552b800 r10:00000000 r9:84bdf700 r8:8027ed34 r7:eb645e60 r6:855aa200 r5:8556ec00 task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:5008 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6a5d84 r8:00000002 r7:60000013 r6:eb6a5d8c r5:85562400 r4:85562400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85562400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fec0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85562400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552bf8c r4:8552bc00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8552bf8c r4:84bdf780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85562400 r8:84bdf7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdf780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508fc40 INFO: task kworker/0:748:5008 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: abf76000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdf800 r8:8027ed34 r7:eb6a5e60 r6:855aa300 r5:8556c800 r4:8508fc40 r4:00000000 r4:82abe1e4 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:5010 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:84811800 r4:84811800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84811800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84811800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553438c r4:85534000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553438c r4:84bdf880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82abe1e4 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:5012 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:5012 tgid:5012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb685d84 r8:00000002 r7:60000013 r6:eb685d8c r5:84812400 r4:84812400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84812400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078e80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84812400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ad000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553478c r4:85534400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553478c r4:84bdf980 r10:00000000 r9:84bdf980 r8:8027ed34 r7:eb6b1e60 r6:84bdfa00 r5:84812400 r4:8508ff80 Call trace: 1d60: 80000013 ffffffff r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:5014 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:84813000 r4:84813000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84813000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af240 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84813000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85534b8c r4:85534800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85534b8c r4:84bdfa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84813000 r8:84bdfaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfa80 r8:8027ed34 r7:eb6b1e60 r6:84bdfb00 r5:84813000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8508ff80 Call trace: [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:84813c00 r4:84813c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84813c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af340 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84813c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85534f8c r4:85534c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85534f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84813c00 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:eb6b1e60 r6:84bdfc00 r5:84813c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af140 INFO: task kworker/0:753:5018 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: ad434000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6c9d84 r8:00000002 r7:60000113 r6:eb6c9d8c r5:84814800 r4:84814800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84814800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af480 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84814800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553538c r4:85535000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553538c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84814800 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:eb6b1e60 r6:84bdfd00 r5:84814800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdf911d20 to 0xdf911d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84815400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84815400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6dd000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553578c r4:85535400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553578c r4:84bdfd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84815400 r8:84bdfdac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfd80 r8:8027ed34 r7:eb6b1e60 r6:84bdfe00 r5:84815400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af4c0 INFO: task kworker/0:755:5021 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80000013 ffffffff r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6edd84 r8:00000002 r7:60000013 r6:eb6edd8c r5:84816000 r4:84816000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84816000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afa80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84816000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553638c r4:85536000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553638c r4:84bdfe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84816000 r8:84bdfeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfe80 r8:8027ed34 r7:eb6b1e60 r6:84bdff00 r5:84816000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af5c0 INFO: task kworker/0:756:5023 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: ae25b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:5025 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84816c00 r4:829185c0 r4:00000000 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: ae9bf000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:5027 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:85570c00 r4:85570c00 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85570c00 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afb40 r4:00000000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855b9080 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82abe1e4 r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:5029 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:85571800 r4:85571800 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85571800 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afe80 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85571800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85536f8c r4:85536c00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85536f8c r4:855b9100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85571800 r8:855b912c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:855b9100 r8:8027ed34 r7:eb515e60 r6:855aa400 r5:85571800 r4:855afa40 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:5030 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:5032 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb709d84 r8:00000002 r7:60000113 r6:eb709d8c r5:85570000 r4:85570000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85570000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84955100 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:855b9280 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d60: 80000013 ffffffff r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:762:5034 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb711d84 r8:00000002 r7:60000113 r6:eb711d8c r5:85573000 r4:85573000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85573000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855affc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85573000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0777000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553738c r4:85537000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553738c r4:855b9200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85573000 r8:855b922c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b9200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b9200 r8:8027ed34 r7:eb709e60 r6:855aa580 r5:85573000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:855afc00 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5037 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb719d84 r8:00000002 r7:60000113 r6:eb719d8c r5:85575400 r4:85575400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85575400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1440 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85575400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab21000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553c38c r4:8553c000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553c38c r4:855b9300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85575400 r8:855b932c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b9300 r10:00000000 r9:855b9300 r8:8027ed34 r7:eb709e60 r6:855aa600 r5:85575400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r4:00000000 r5:84b1eb8c r4:84b1e800 r4:833b4e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:764 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1040 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855c1080 INFO: task kworker/0:764:5038 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: afba0000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:765:5040 blocked for more than 478 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:765 state:D stack:0 pid:5040 tgid:5040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:8556e000 r5:8556e000 r4:829185c0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c12c0 r7:dddced40 r6:83018000 r5:85537f8c r4:855b9400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 80000013 ffffffff r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:766:5043 blocked for more than 479 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb721d84 r8:00000002 r7:60000013 r6:eb721d8c r5:84548000 r4:84548000 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84548000 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1780 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84548000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2d000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553cb8c r4:8553c800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553cb8c r4:855b9500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84548000 r8:855b952c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b9500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b9500 r8:8027ed34 r7:eb719e60 r6:855b9580 r5:84548000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855c1240 INFO: task kworker/0:766:5043 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: b01bb000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8553c78c r4:8553c400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553c78c r4:855b9600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84548c00 r8:855b962c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b9600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b9600 r8:8027ed34 r7:eb721e60 r6:855b9680 r5:84548c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855c1240 INFO: task kworker/0:767:5044 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: b0791000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:df911dc0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 Exception stack(0xdf911fb0 to 0xdf911ff8) r4:833b5d80 task:kworker/0:768 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855b9700 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5049 blocked for more than 479 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb731d84 r8:00000002 r7:60000013 r6:eb731d8c r5:8454a400 r4:8454a400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8454a400 r4:829185c0 [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c18c0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8454a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc9000 r7:dddced40 r6:83018000 r5:8553cf8c r4:855b9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80000013 ffffffff r4:df911dc0 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:8454b000 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1bc0 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8454b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae33000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553d78c r4:8553d400 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553d78c r4:855b9900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8454b000 r8:855b992c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b9900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b9900 r8:8027ed34 r7:eb729e60 r6:855b9980 r5:8454b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855c1740 INFO: task kworker/0:770:5051 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: b11bb000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8454bc00 r4:829185c0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1d00 r7:dddced40 r6:83018000 r5:8553db8c r4:855b9a00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: b13d7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:00000001 INFO: task kworker/0:772:5055 blocked for more than 479 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855c1b80 INFO: task kworker/0:772:5055 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: b189e000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1eb8c r4:84b1e800 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833b4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833b5d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:5057 blocked for more than 479 seconds. Not tainted 6.16.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:5057 tgid:5057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:8454d400 r4:8454d400 [<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8454d400 r8:855b9c2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855c1d40 INFO: task kworker/0:773:5057 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d20: b1a1f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0 1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08 r4:df911dc0 [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:774 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8880 r4:00000000 [<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8454e000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedf000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553e38c r4:8553e000 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553e38c r4:855b9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8454e000 r8:855b9d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b9d00 r8:8027ed34 r7:eb741e60 r6:855b9d80 r5:8454e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a8cc0 INFO: task kworker/0:774:5059 is blocked on a mutex likely owned by task kworker/1:1:43. task:kworker/1:1 state:R running task stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000 r4:00000000 [<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf911d20 to 0xdf911d68) 1d60: 80000013 ffffffff r4:df911dc0 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855da480 [<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc5000 [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553ef8c r4:8553ec00 [<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8553ef8c r4:855b9e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8454ec00 r8:855b9e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b9e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b9e00 r8:8027ed34 r7:eb741e60 r6:855b9e80 r5:8454ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000